text
stringlengths
5
10.5k
source
stringlengths
33
146
1, became available in 2001 with an 800 MHz clock. The Itanium 2, first delivered in 2003, had a maximum clock rate in 2005 of 1.6 GHz. The two processors are very similar, with some differences in the pipeline structure and greater differences in the memory hierarchies. The Itanium 2 is about four times faster than the Itanium 1. This performance improvement comes from a doubling of the clock rate, a more aggressive memory hierarchy, additional func-tional units that improve instruction throughput, more complete bypassing, a H-40 ■ Appendix H Hardware and Software for VLIW and EPIC shorter pipeline that reduces some stalls, and a more mature compiler system. Dur-ing roughly the same period that elapsed from the Itanium 1 to Itanium 2, the Pen-tium processors improved by slightly more than a factor of three. The greater improvement for the Itanium is reasonable given the novelty of the architecture and software system versus the more established IA-32 implementations. The Itanium 2 can fetch and issue two bundles, or up to six instructions, per clock. The Itanium 2 uses a three-level memory hierarchy all on-chip. The first level uses split instruction and data caches, each 16 KB; floating-point data are not placed in the first-level cache. The second and third levels are unified caches of 256 KB and of 3 MB to 9 MB, respectively. Functional Units and Instruction Issue There are 11 functional units in the Itanium 2 processor: two I-units, four M-units (two for loads and two for stores), three B-units, and two F-units. All the functional units are pipelined. Figure H.10 gives the pipeline latencies for some typical instructions. In addition, when a result is bypassed from one unit to another, there is usually at least one additional cycle of delay. Itanium 2 can issue up to six
{"source": 2300, "title": "from dpo"}
as tab stops. > Ternary operator An operator with three arguments. Java has one ternary operator, a ? b : c. > Test suite A set of test cases for a program. > Text field A user-interface component that allows a user to provide text input. > Text file A file in which values are stored in their text representation. > Throw an exception Indicate an abnormal condition by terminating the normal control flow of a program and transferring control to a matching catch clause. > throws clause Indicates the types of the checked exceptions that a method may throw. > Token A sequence of consecutive characters from an input source that belongs together for the purpose of analyz ing the input. For example, a token can be a sequence of characters other than white space. > Trace message A message that is printed during a program run for debugging purposes. > try statement A statement with a body containing one or more statements that are executed until the end of the body is reached or an exception occurs, together with clauses that are invoked when exceptions of a particular type occur. G-8 Glossary > try -with-resources A version of the try statement whose header initializes a variable of a class that implements the AutoCloseable interface. The close method is invoked on that variable when the try statement terminates, either normally or through an exception. > Turing machine A very simple model of computation that is used in theoretical computer science to explore computability of problems. > Two-dimensional array A tabular arrangement of elements in which an element is specified by a row and a col umn index. > Type A named set of values and the operations that can be carried out with them. > Type parameter A parameter
{"source": 4220, "title": "from dpo"}
subspace generated by the "Plucker" relations (15 .53). Exercise 15.56. Show that, if the factor I\" V is omitted from the construction, the resulting algebra is the direct sum of all irreducible representations of > SL(V) ## = SLnC. > It is remarkable that all the representations § ;.(cn) of GLnC were written down by Deruyts (following Clebsch) a century ago, before representation theory was born, as in the following exercise. Exercise 15.57*. Let X = (Xi) be an n x n matrix of indeterminates. The group G = GLnC acts on the polynomial ring C[xi , j] by g' Xi,j = L~=l ak ,i xk,j for 9 = (a i ) E GLnC. For any tableau T on the Young diagram of A. consisting of the integers from 1 to n, strictly increasing in the columns, let e T be the product of minors constructed from X, one for each column, as follows: if the column of T has length J.lj' form the minor using the first J.lj columns, and use the rows that are numbered by the entries of the column of T. Let D;. be the subspace of C[xi,j] spanned by these eT , where d is the number partitioned by A.. Show that: (i) D;. is preserved by GLnC; (ii) the e T , where T is semi-standard, form a basis for D;.; (iii) D;. is isomorphic to §;.(cn). LECTURE 16 # Symplectic Lie Algebras In this lecture we do for the symplectic Lie algebras exactly what we did for the special linear ones in §lS.l and most of §lS.2: we will first describe in general the structure of a symplectic Lie algebra (that is, give a Cartan subalgebra, find the roots, describe the Killing form, and so on). We will then work out in some
{"source": 6137, "title": "from dpo"}
Gabriel Stokes: fluid mechanics Gustav Kirchhoff: theory of plates Josiah Willard Gibbs: thermodynamics Heinrich Rudolf Hertz: contact mechanics == People who made lasting contributions to mechanics and died during or after the 20th century == Ludwig Burmester: theory of linkages Carlo Alberto Castigliano: Elasticity (physics) Ludwig Prandtl: Fluid mechanics, Plasticity Stephen Timoshenko: author of many lasting textbooks, father of modern applied mechanics Theodore von Karman: Fluid mechanics, Structural instability Richard Edler von Mises: Plasticity Geoffrey Ingram Taylor: Fluid mechanics, theory of dislocations. Alan Arnold Griffith: founder of Fracture mechanics George Rankine Irwin: father of modern Fracture mechanics Warner T. Koiter: Solid mechanics, Structural instability John D. Eshelby: inclusion in elastic body == Honors and awards == by European Mechanics Society [1], Euromech Fellow [2] Solid and Fluid Mechanics Prizes [3] by Applied Mechanics Division, American Society of Mechanical Engineers Timoshenko Medal Koiter Medal Drucker Medal Thomas K. Caughey Dynamics Award Ted Belytschko Applied Mechanics Award Thomas J.R. Hughes Young Investigator Award by American Society of Civil Engineers Theodore von Karman Medal, ASCE by Society of Engineering Science, Inc. Eringen Medal William Prager Medal in Solid Mechanics G. I. Taylor Medal in Fluid Mechanics == See also == Applied mechanics Mechanics Geomechanics Biomechanics Structural analysis Fluid mechanics == Footnotes == == External links == iMechanica, news and views of interest to mechanicians and their friends. Homepage of the ASME International Applied Mechanics Division Mathematics Genealogy Project Mechanician Career Description The MacTutor History of Mathematics archive
{"page_id": 4595238, "title": "Mechanician"}
energetic neighbourhood. The one-electron energy levels are specified by the wave vector k {\displaystyle k} through the relation ϵ ( k ) = ℏ 2 k 2 / 2 m {\displaystyle \epsilon (k)=\hbar ^{2}k^{2}/2m} with m {\displaystyle m} the electron mass. This relation separates the occupied energy states from the unoccupied ones and corresponds to the spherical surface in k-space. As T → 0 {\displaystyle T\rightarrow 0} the ground state distribution becomes: f = { 1 if ϵ f < μ , 0 if ϵ f > μ . {\displaystyle f={\begin{cases}1&{\mbox{if }}\epsilon _{f}<\mu ,\\0&{\mbox{if }}\epsilon _{f}>\mu .\\\end{cases}}} where f {\displaystyle f} is the Fermi–Dirac distribution ϵ f {\displaystyle \epsilon _{f}} is the energy of the energy level corresponding to the ground state μ {\displaystyle \mu } is the ground state energy in the limit T → 0 {\displaystyle T\rightarrow 0} , which thus still deviates from the true ground state energy. This implies that the ground state is the only occupied state for electrons in the limit T → 0 {\displaystyle T\rightarrow 0} , the f = 1 {\displaystyle f=1} takes the Pauli exclusion principle into account. The internal energy U {\displaystyle U} of a system within the free electron model is given by the sum over one-electron levels times the mean number of electrons in that level: U = 2 ∑ k ϵ ( k ) f ( ϵ ( k ) ) {\displaystyle U=2\sum _{k}\epsilon (\mathbf {k} )f(\epsilon (\mathbf {k} ))} where the factor of 2 accounts for the spin up and spin down states of the electron. === Reduced internal energy and electron density === Using the approximation that for a sum over a smooth function F ( k ) {\displaystyle F(k)} over all allowed values of k {\displaystyle k} for finite large system is given by:
{"page_id": 51215300, "title": "Electronic specific heat"}
The I. I. Rabi Prize in Atomic, Molecular, and Optical Physics is given by the American Physical Society to recognize outstanding work by mid-career researchers in the field of atomic, molecular, and optical physics. The award was endowed in 1989 in honor of the physicist I. I. Rabi and has been awarded biannually since 1991. The prize citation reads: "To recognize and encourage outstanding research in Atomic, Molecular and Optical Physics by investigators who have held a Ph.D. for no more than 10 years prior to the nomination deadline. The prize consists of $10,000 and a certificate citing the contributions made by the recipient. An allowance will be provided for travel expenses of the recipient to the Society meeting at which the prize is presented. It is awarded in odd-numbered years." == Recipients == Source: 1991 Chris H. Greene: "For his many contributions to atomic and molecular theory including studies of resonance vibronic processes, multiple electron excitations, photo-absorption in external fields, and threshold effects of long range forces." 1993 Timothy E. Chupp: "For his contributions to the development of high density polarized noble gases by spin exchange with optically pumped alkali atoms and in particular for his leadership and use of polarized 3He as a target for fundamental experiments in nuclear physics." 1995 Randall G. Hulet: "For his contributions to a broad range of important problems in atomic and optical physics including cavity quantum electrodynamics, quantum jumps, ion storage, and laser cooling of atoms. In the latter field, in particular for his demonstration of multiphoton cooling involving Doppleron resonances in neutral Lithium and his collision experiments with cooled Lithium vapor." 1997 Eric Allin Cornell and Wolfgang Ketterle: "For achieving Bose-Einstein condensation of an atomic gas, for creating techniques for studying the Bose condensate, and for measuring the physical properties of
{"page_id": 61334503, "title": "I. I. Rabi Prize"}
a product representation (Euler product): D h ( s ) = ∏ P ( ∑ n = ⁡ 0 ∞ h ( P n ) | P | − s n ) , {\displaystyle D_{h}(s)=\prod _{P}\left(\sum _{n\mathop {=} 0}^{\infty }h(P^{n})|P|^{-sn}\right),} where the product runs over all monic irreducible polynomials P. For example, the product representation of the zeta function is as for the integers: ζ A ( s ) = ∏ P ( 1 − | P | − s ) − 1 . {\displaystyle \zeta _{A}(s)=\prod _{P}(1-|P|^{-s})^{-1}.} Unlike the classical zeta function, ζ A ( s ) {\displaystyle \zeta _{A}(s)} is a simple rational function: ζ A ( s ) = ∑ f | f | − s = ∑ n ∑ deg ⁡ ( f ) = n q − s n = ∑ n ( q n − s n ) = ( 1 − q 1 − s ) − 1 . {\displaystyle \zeta _{A}(s)=\sum _{f}|f|^{-s}=\sum _{n}\sum _{\deg(f)=n}q^{-sn}=\sum _{n}(q^{n-sn})=(1-q^{1-s})^{-1}.} In a similar way, If f and g are two polynomial arithmetic functions, one defines f * g, the Dirichlet convolution of f and g, by ( f ∗ g ) ( m ) = ∑ d ∣ m f ( d ) g ( m d ) = ∑ a b = m f ( a ) g ( b ) , {\displaystyle {\begin{aligned}(f*g)(m)&=\sum _{d\mid m}f(d)g\left({\frac {m}{d}}\right)\\&=\sum _{ab=m}f(a)g(b),\end{aligned}}} where the sum is over all monic divisors d of m, or equivalently over all pairs (a, b) of monic polynomials whose product is m. The identity D h D g = D h ∗ g {\displaystyle D_{h}D_{g}=D_{h*g}} still holds. == Multivariate == Multivariate functions can be constructed using multiplicative model estimators. Where a matrix function of A is defined as D N = N 2 × N
{"page_id": 20059, "title": "Multiplicative function"}
extent, of the object or system of which the quantity is a property, whereas magnitudes of an extensive quantity are additive for parts of an entity or subsystems. Thus, magnitude does depend on the extent of the entity or system in the case of extensive quantity. Examples of intensive quantities are density and pressure, while examples of extensive quantities are energy, volume, and mass. == In natural language == In human languages, including English, number is a syntactic category, along with person and gender. The quantity is expressed by identifiers, definite and indefinite, and quantifiers, definite and indefinite, as well as by three types of nouns: 1. count unit nouns or countables; 2. mass nouns, uncountables, referring to the indefinite, unidentified amounts; 3. nouns of multitude (collective nouns). The word ‘number’ belongs to a noun of multitude standing either for a single entity or for the individuals making the whole. An amount in general is expressed by a special class of words called identifiers, indefinite and definite and quantifiers, definite and indefinite. The amount may be expressed by: singular form and plural from, ordinal numbers before a count noun singular (first, second, third...), the demonstratives; definite and indefinite numbers and measurements (hundred/hundreds, million/millions), or cardinal numbers before count nouns. The set of language quantifiers covers "a few, a great number, many, several (for count names); a bit of, a little, less, a great deal (amount) of, much (for mass names); all, plenty of, a lot of, enough, more, most, some, any, both, each, either, neither, every, no". For the complex case of unidentified amounts, the parts and examples of a mass are indicated with respect to the following: a measure of a mass (two kilos of rice and twenty bottles of milk or ten pieces of paper); a piece or
{"page_id": 691277, "title": "Quantity"}
of Units. It is equal to the energy transferred to (or work done on) an object when a force of one newton acts on that object in the direction of the force's motion through a distance of one metre (1 newton metre or N⋅m). It is also the energy dissipated as heat when an electric current of one ampere passes through a resistance of one ohm for one second. It is named after the English physicist James Prescott Joule (1818–1889). == K == Kalman filter An algorithm for estimating an unknown value from a series of approximate measurements. Kelvin–Stokes theorem A theorem in calculus, useful in analytic solutions of problems in electromagnetism. Kilovolt-ampere A unit of apparent power. Kirchhoff's circuit laws The observation that the sum of the currents at any node of a circuit must be zero, and the sum of the voltage differences around any loop must be zero; often abbreviated "KCL" and "KVL" in lecture notes. Klystron A type of microwave oscillator vacuum tube. == L == Ladder network A string of many, often equally dimensioned, impedances connected between two reference voltages. LAN Local Area Network, an interconnection of computers over a building or small campus. Laplace transform A mathematical operation for solution of differential equations by transforming them to the s domain from the time domain. laser diode A semiconductor device that produces coherent laser radiation when properly energized. leakage inductance The inductance of a transformer that results from magnetic flux not linked by both primary and secondary windings. light-emitting diode A semiconductor device that produces light or infrared or ultraviolet radiation when properly energized. linear alternator An electrical machine that generates electric power from the relative straight-line motion of its parts. linear motor An electrical machine that generates electric force in a straight line by
{"page_id": 50937678, "title": "Glossary of electrical and electronics engineering"}
attenuation at 6 Hz and 70 kHz, well outside the audible range. === Negative feedback === Typical (non-OTL) tube power amplifiers could not use as much negative feedback (NFB) as transistor amplifiers due to the large phase shifts caused by the output transformers and their lower stage gains. While the absence of NFB greatly increases harmonic distortion, it avoids instability, as well as slew rate and bandwidth limitations imposed by dominant-pole compensation in transistor amplifiers. However, the effects of using low feedback principally apply only to circuits where significant phase shifts are an issue (e.g. power amplifiers). In preamplifier stages, high amounts of negative feedback can easily be employed. Such designs are commonly found from many tube-based applications aiming to higher fidelity. On the other hand, the dominant pole compensation in transistor amplifiers is precisely controlled: exactly as much of it can be applied as needed to strike a good compromise for the given application. The effect of dominant pole compensation is that gain is reduced at higher frequencies. There is increasingly less NFB at high frequencies due to the reduced loop gain. In audio amplifiers, the bandwidth limitations introduced by compensation are still far beyond the audio frequency range, and the slew rate limitations can be configured such that full amplitude 20 kHz signal can be reproduced without the signal encountering slew rate distortion, which is not even necessary for reproducing actual audio material. === Power supplies === Early tube amplifiers had power supplies based on rectifier tubes. These supplies were unregulated, a practice which continues to this day in transistor amplifier designs. The typical anode supply was a rectifier, perhaps half-wave, a choke (inductor) and a filter capacitor. When the tube amplifier was operated at high volume, due to the high impedance of the rectifier tubes, the power
{"page_id": 23714384, "title": "Tube sound"}
An ice volcano is a conical mound of ice formed over a terrestrial lake via the eruption of water and slush through an ice shelf. The process is wave-driven, with wind providing the energy for the waves to cut through the ice and create formations that loosely mimic the shape and activity of volcanoes. After being ejected into the atmosphere, the liquid water and slush freeze and fall back to the surface, growing the formation. Ice may also be erupted. The phenomenon is most often observed along the southern coast of Lake Erie and Lake Ontario, when the temperature is below freezing and the wind blows onshore with a velocity of at least 25 mph (40 km/h). They are known to reduce coastal erosion there. The formations are temporary: they are frequently destroyed by storms and warm weather, and once the lake wholly freezes over, eruptions are no longer possible. There is no consensus name for this phenomenon. Due to its visual similarity to volcanism and particularly cryovolcanism, the term "ice volcano" is frequently used, but it remains controversial. Unlike geysers and related structures, ice volcanoes are not hydrothermal. The uplifts may attract a number of visitors, but they are dangerous, and experts warn that people may fall through the ice or slip into the cold lake. Ice volcanoes are used by snowy owls as hunting platforms to search for waterfowl. == Formation == These features are distinct from pressure ridges, which are uplifts formed by the compression of ice against a shoreline or another floe. Instead, ice volcanoes are created by waves colliding with irregularities at the edge of an ice sheet. The abnormalities concentrate the wave energy in a small area, where the ice is eroded to form a V-shaped channel. Spray, ice, and slush splashing out of
{"page_id": 1473312, "title": "Ice volcano"}
⁡ ( 2 θ ) + sin 2 ⁡ ( 2 θ ) cos ⁡ ( δ ) cos ⁡ ( 2 θ ) sin ⁡ ( 2 θ ) ( 1 − cos ⁡ ( δ ) ) sin ⁡ ( 2 θ ) sin ⁡ ( δ ) 0 cos ⁡ ( 2 θ ) sin ⁡ ( 2 θ ) ( 1 − cos ⁡ ( δ ) ) cos 2 ⁡ ( 2 θ ) cos ⁡ ( δ ) + sin 2 ⁡ ( 2 θ ) − cos ⁡ ( 2 θ ) sin ⁡ ( δ ) 0 − sin ⁡ ( 2 θ ) sin ⁡ ( δ ) cos ⁡ ( 2 θ ) sin ⁡ ( δ ) cos ⁡ ( δ ) ) {\displaystyle {\begin{pmatrix}1&0&0&0\\0&\cos ^{2}(2\theta )+\sin ^{2}(2\theta )\cos(\delta )&\cos(2\theta )\sin(2\theta )\left(1-\cos(\delta )\right)&\sin(2\theta )\sin(\delta )\\0&\cos(2\theta )\sin(2\theta )\left(1-\cos(\delta )\right)&\cos ^{2}(2\theta )\cos(\delta )+\sin ^{2}(2\theta )&-\cos(2\theta )\sin(\delta )\\0&-\sin(2\theta )\sin(\delta )&\cos(2\theta )\sin(\delta )&\cos(\delta )\end{pmatrix}}\quad } where δ {\displaystyle \delta } is the phase difference between the fast and slow axis and θ {\displaystyle \theta } is the angle of the slow axis. Quarter-wave plate (fast-axis vertical) ( 1 0 0 0 0 1 0 0 0 0 0 − 1 0 0 1 0 ) {\displaystyle {\begin{pmatrix}1&0&0&0\\0&1&0&0\\0&0&0&-1\\0&0&1&0\end{pmatrix}}} Quarter-wave plate (fast-axis horizontal) ( 1 0 0 0 0 1 0 0 0 0 0 1 0 0 − 1 0 ) {\displaystyle {\begin{pmatrix}1&0&0&0\\0&1&0&0\\0&0&0&1\\0&0&-1&0\end{pmatrix}}} Half-wave plate (fast-axis horizontal and vertical; also, ideal mirror) ( 1 0 0 0 0 1 0 0 0 0 − 1 0 0 0 0 − 1 ) {\displaystyle {\begin{pmatrix}1&0&0&0\\0&1&0&0\\0&0&-1&0\\0&0&0&-1\end{pmatrix}}} Attenuating filter (25% transmission) 1 4 ( 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 ) {\displaystyle {1 \over 4}{\begin{pmatrix}1&0&0&0\\0&1&0&0\\0&0&1&0\\0&0&0&1\end{pmatrix}}\quad } ==
{"page_id": 2297912, "title": "Mueller calculus"}
whose metal structure (i.e. Molybdenum composition) became regulated due to mining and manufacturing toxicity by OSHA and EPA restrictions. == References == == External links == Statement by Dr. Edward Wolfrum on Wolfbox - Audio Graphic Services Ed Wolfrum interview on United Sound - TQM Recording Co. Wolfbox Schematic - PDF, Audio Graphic Services Video interview with Dr. Edward Wolfrum - Detroit Free Press video interview, Brian Kaufman and Brian McCollum Soul-Source Article - "Ed Wolfrum - Detroit Sound" 2012 excerpt by Rob Moss from forthcoming book WDET Interview - "Motown Legends Dr. Ed Wolfrum and Paul Riser" The Craig Fahle Show, WDET-FM Molybdenum Toxicity PDF - "What You Should Know About Molybdenum" PDF, Texas Dept. of State Health Services
{"page_id": 44279507, "title": "Wolfbox"}
semi-automatic experiment in which a user was allowed to edit the INQlOl query prior to running it. As in the past, the user was restricted to deleting query terms, grouping query terms with proximity operators, adjusting query term weights, and adding query terms from the Narrative. No other kind of modification was permitted. 33 The ofRcial results for INQlOl and INQ102 are summarized below. ## Query Type Average Precision 5 Docs 30 Docs 100 Docs 11-Pt Avg INQlOl .64 .57 .44 .37 INQ102 .74 (+15.5%) .63 (+11.0%) .49 (+11.5%) .42 (+15.5%) Limited user modification of INQlOl produced a very significant 15.5% improvement > in average precision. Most of this improvement appears to be due to 1) deleting useless query terms introduced by query processing or PhraseFinder, and 2) grouping query terms with proximity operators. Clearly there remains room for improvement in automatic query processing techniques. After TREC-3, experiments were done to investigate the effect of the changes made this year. Our simple query processing improved precision very significantly at almost aU levels of recall, as shown in the table below. The average precision obtained with query processing was 84.2% higher than the average precision obtained by using raw words alone. Recall Precision (50 queries) ## Raw RW W/0 Stop SN With FW With Words & Not Phrases Field Weights #PHRASE op (RW) (SN) (FW) (PO) > 0 45.3 61.8 (+36.3) 78.8 (+74.0) 79.6 (+75.8) 10 28.2 40.1 (+41.9) 50.1 (+77.5) 57.0 (+102.0) 20 24.3 33.1 (+36.2) 40.3 (+66.2) 46.6 (+92.0) 30 21.6 29.7 (+37.3) 33.7 (+55.6) 40.1 (+85.5) 40 18.0 24.9 (+38.7) 28.0 (+55.6) 33.8 (+88.1) 50 15.7 21.3 (+35.7) 23.9 (+52.0) 27.7 (+76.5) 60 13.1 18.0 (+38.0) 20.3 (+55.8) 22.7 (+73.7) 70 10.6 14.7 (+37.8) 17.1 (+60.4) 18.4 (+72.8) 80 7.9 11.3 (+43.8) 13.1 (+66.9) 13.3 (+68.7) 90 4.5
{"source": 1021, "title": "from dpo"}
regular graphs, too. Therefore, prompted by the recent substantial progress of Gao [ Reference Gao 3] on the Sandwich Conjecture (which appeared on arXiv after the first version of this manuscript), in the current version of the manuscript we added Section 7, which outlines how to modify our proofs to get a corresponding sandwiching for non-bipartite graphs. This improves upon the results in [ Reference Gao, Isaev and McKay 4] (for regular graphs), but is now superseded by [ Reference Gao 3]. 1.4. Organisation In Section 2 we introduce the notation and tools used throughout the paper: the switching technique, probabilistic inequalities and an enumeration result for bipartite graphs with a given degree sequence. In Section 3 we state a crucial Lemma 6 and show how it implies Theorem 2. In Section 4 we give a proof of Lemma 6 based on two technical lemmas, one about the concentration of a degree-related parameter (Lemma 9), the other (Lemma 10) facilitating the switching technique used in the proof of Lemma 6. Lemma 9 is proved in Section 5, after giving some auxiliary results establishing the concentration of degrees and co-degrees in \mathbb{R}(n_1,n_2,p) as well as in its conditional versions. In Section 6, we present a proof of Lemma 10, preceded by a purely deterministic result about alternating cycles in 2-edge-coloured pseudorandom graphs. We defer some technical but straightforward results and their proofs (e.g., the proof of Claim 7) to Section 8. A flowchart of the results ultimately leading to the proof of Theorem 2 is presented in Figure 1. Figure 1. The structure of the proof of Theorem 2. An arrow from statement A to statement B means that A is used in the proof of B. The numbers in the brackets point to the section where a statement is formulated
{"source": 2808, "title": "from dpo"}
discriminating responses [that are] closely connected with beliefs about how things are and what is important" (LK, 41). Nussbaum begins her case for literature with a critique of conventional philosophic prose. While philosophers have tended to view literary narrative as an inadequate tool for the conveyance of truth, they have seen their medium of expression as ideally suited to the task of describing the true nature of things. Nussbaum gives us cause to question this assumption. She contends that conventional philosophic prose is limited because of its tendency toward abstraction and its privileging of reason at the expense of emotion. As Nussbaum explains, when a style that is abstract and cleansed of emotion is employed to describe a reality that is concrete, complex, and infused with feeling, problems inevitably result. She asserts, "only the style of a certain sort of narrative artist (and not, for example, the style associated with the abstract theoretical treatise) can adequately state certain important truths about the world, embodying them in its shape and setting up in the reader the activities that are appropriate for grasping them" (LK, 6). In particular, Nussbaum contends that conventional philosophic prose is stylistically unsuitable for the expression of our moral situation. She maintains that this style misrepresents our situation and encourages misunderstanding regarding how we ought to live in it. She concludes that conventional philosophic prose is not sufficient to disclose the nature of our situation in a way that could educate us morally. She claims that literature is an essential supplement to conventional philosophic works when it comes to the study of moral philosophy and moral education generally. Nussbaum continues her case for literature by enumerating the features of the narrative style that make it conducive to the articulation of our moral situation. She contends that literature is
{"source": 5205, "title": "from dpo"}
Security Outdated encryption stored on blockchain * * * * * * Please pardon my ignorance. I’ve read several publications related to blockchain being used in healthcare, construction and the like. Many of these publications state that blockchain allows the storage of secured data. My question is this: If data is “securely” stored on blockchain (I assume encrypted) and the encryption algorithm LATER (after long-term usage) is proven to be “cryptographically broken” (e.g., SHA-1) … * does this not mean all “secured” data on the blockchain using that algorithm is suddenly public? * are there steps that can be taken to re-encrypt the data to avoid the massive leak of data? Kind regards. 7 posts - 4 participants Read full topic to identify patterns of multi-block MEV. * We observe fewer multi-slot sequences of builders than a random Monte Carlo simulation would predict. The longest observed multi-slot sequence is 25 slots. * Average MEV-Boost payments increase for longer consecutive sequences by the same builder from ~0.05 ETH for single slots to ~0.08 ETH for nine consecutive slots. * In longer sequences, the payment per slot increases slightly with later slots. This indicates that builders bid higher to get longer sequences or the first slot after a longer sequence. * There is a weak positive autocorrelation between subsequent MEV-Boost payments. This contradicts the
{"source": 6413, "title": "from dpo"}
normally be ignored. This high variance is due to the choice of using the grand canonical ensemble for the entire system, including the condensate state. === Thermodynamics === Expanded out, the grand potential is: Ω = g 0 ln ⁡ ( 1 − z ) − Li α + 1 ( z ) ( β E c ) α {\displaystyle \Omega =g_{0}\ln(1-z)-{\frac {{\textrm {Li}}_{\alpha +1}(z)}{\left(\beta E_{\rm {c}}\right)^{\alpha }}}} All thermodynamic properties can be computed from this potential. The following table lists various thermodynamic quantities calculated in the limit of low temperature and high temperature, and in the limit of infinite particle number. An equal sign (=) indicates an exact result, while an approximation symbol indicates that only the first few terms of a series in τ α {\displaystyle \tau ^{\alpha }} is shown. It is seen that all quantities approach the values for a classical ideal gas in the limit of large temperature. The above values can be used to calculate other thermodynamic quantities. For example, the relationship between internal energy and the product of pressure and volume is the same as that for a classical ideal gas over all temperatures: U = ∂ Ω ∂ β = α P V {\displaystyle U={\frac {\partial \Omega }{\partial \beta }}=\alpha PV} A similar situation holds for the specific heat at constant volume C V = ∂ U ∂ T = k B ( α + 1 ) U β {\displaystyle C_{V}={\frac {\partial U}{\partial T}}=k_{\rm {B}}(\alpha +1)\,U\beta } The entropy is given by: T S = U + P V − G {\displaystyle TS=U+PV-G\,} Note that in the limit of high temperature, we have T S = ( α + 1 ) + ln ⁡ ( τ α ζ ( α ) ) {\displaystyle TS=(\alpha +1)+\ln \left({\frac {\tau ^{\alpha }}{\zeta (\alpha )}}\right)} which,
{"page_id": 1064839, "title": "Bose gas"}
to a substance or activity, determined in accordance with scientifically accepted methodology." The risk to be assessed under article 5.1 must be a specific risk that has "the actual potential for adverse effects on human health in the real world where people live and work and die." This can be contrasted with "risk management", which takes into account the result of the risk assessment in addition to the social values and politics. Risk management seeks to establish the level of risk a particular society is willing to take in relation to the potential harm and the corresponding SPS measure. == References ==
{"page_id": 46636963, "title": "Risk Assessment under the Sanitary and Phytosanitary Agreement"}
The Skystone is an andesite glacial erratic boulder in Bonney Lake, Washington. The boulder was deposited approximately 13,000 years ago. The stone's height and width are 4.5 by 12 feet (1.4 m × 3.7 m). == Uses == The stone may have astronomical significance to the Puyallup tribe of Native Americans. It has over 20 pits pounded into its surface that appear to be man-made. The holes seem to point towards both astronomical and geographic features. The holes point in the direction of Polaris, Sirius, the Little Dipper, and Orion. The stone may have also been used to predict lunar standstills. Some of the holes align with the sun's position on the solstices, which may have allowed Native Americans to predict the changing of seasons. Pits in the surface of the boulder also appear to point towards Mt. Rainier, the peak of Mt. St. Helens (before it erupted), and potentially Mt. Adams, all of which have significance for local Native tribes. The stone is about one mile south of the former Naches Trail, and was apparently rediscovered when a suburban housing development was begun in 1999. It is listed and preserved as an archaeological site by the Washington State Office of Archaeology and Historic Preservation. == See also == List of individual rocks Viking Altar Rock, a Minnesota erratic with pits drilled in its upper surface == References == == Further reading == "The night sky as a cultural resource", Official blog, Washington State Office of Archaeology and Historic Preservation, October 8, 2009 James Hicks, "Bonney Lake Skystone", Strange Destinations Anna Edmonds, Skystone, Bainbridge Island, Washington: Battle Point Astronomical Association Doug Kirby; Ken Smith; Mike Wilkins, eds. (c. 2004). "Bonney Lake, Washington: Skystone – Mysterious Astro-Rock". Roadside America. Retrieved June 8, 2015. Winona Jacobsen; Greater Bonney Lake Historical Society (2011).
{"page_id": 46926125, "title": "Skystone"}
is the ability of a solid material to undergo permanent deformation, a non-reversible change of shape in response to applied forces. For example, a solid piece of metal being bent or pounded into a new shape displays plasticity as permanent changes occur within the material itself. In engineering, the transition from elastic behavior to plastic behavior is known as yielding. PneumaticsThe control of mechanical force and movement, generated by the application of compressed gas. Point estimationIn statistics, point estimation involves the use of sample data to calculate a single value (known as a point estimate since it identifies a point in some parameter space) which is to serve as a "best guess" or "best estimate" of an unknown population parameter (for example, the population mean). More formally, it is the application of a point estimator to the data to obtain a point estimate. Point estimation can be contrasted with interval estimation: such interval estimates are typically either confidence intervals, in the case of frequentist inference, or credible intervals, in the case of Bayesian inference. More generally, a point estimator can be contrasted with a set estimator. Examples are given by confidence sets or credible sets. A point estimator can also be contrasted with a distribution estimator. Examples are given by confidence distributions, randomized estimators, and Bayesian posteriors. Polyphase systemAn electrical system that uses a set of alternating currents at different phases. Power (electric)Electric power is the rate, per unit time, at which electrical energy is transferred by an electric circuit. The SI unit of power is the watt, one joule per second. Electric power is usually produced by electric generators, but can also be supplied by sources such as electric batteries. It is usually supplied to businesses and homes (as domestic mains electricity) by the electric power industry through an
{"page_id": 68711047, "title": "Glossary of engineering: M–Z"}
argument for early aggressive hormonal and fertility management. Fertility and sterility. 98(2):274-283. Samango-Sprouse, CA; Sadeghin, T; Mitchell, FL; Dixon, T; Stapleton, E; Kingery, M; and Gropman, AG. (2012). Positive Effects of Short Course Androgen Therapy on the Neurodevelopmental Outcome In Boys with 47,XXY Syndrome at 36 and 72 Months of Age. Am J Med Genet Pt A. 161(3):501-8.DOI: 10.1002/ajmg.a.35769. Rebecca E. Rosenberg, J. Kiely Law, Connie Anderson, Carole Samango-Sprouse and Paul A. Law. (2012). Survey of Vaccine Beliefs and Practices Among Families Affected by Autism Spectrum Disorders. CLIN PEDIATR. Samango-Sprouse, CA; Gropman, A; Sadeghin, T; Kingery, M; Lutz-Armstrong, M; Rogol, A. (2011). Early Effects of Short Course Androgen Therapy on Children with 49,XXXXY Syndrome on Neurodevelopmental Profile. Acta Pædiatrica. 100(6):861-5. Visootsak J, Graham JM. (2009).Social function in multiple X and Y chromosome disorders: XXY, XYY, XXYY, XXXY. Dev Disabil Res Rev. 15(4): 328–332. Visootsak, Jeannie; Graham, John M., Samango-Sprouse, C., Swerdloff, R., Simpson, J.L. (2008). "Klinefelter Syndrome." Management of Genetic Syndromes. 3rd Edition, Eds. Cassidy, S.B., Allanson, J.E. Wiley-Liss. Samango-Sprouse, CA. (2007). “Frontal Lobe Development in Childhood ”, The Human Frontal Lobe: Functions and Disorders, 2nd Edition. Eds. Miller, BL and Cummings, JL Guilford Press, New York. Hall H, Hunt P, Hassold T. (2006). Meiosis and sex chromosome aneuploidy: how meiotic errors cause aneuploidy; how aneuploidy causes meiotic errors. Curr Opin Genet Dev. 16(3), 323–329. Simpson JL, de la Cruz FF, Swerdloff RS, Samango-Sprouse C, Skakkebaek NE, Graham JM, Hassold T, Aylstock M, et al. (2003). Klinefelter syndrome: Expanding the phenotype and identifying new research directions. Genet Med. 5(6):460–468. Samango-Sprouse, C.A., and Rogol, A. (2002). “XXY: The Hidden Disability and Prototype for Infantile Presentation of Developmental Dyspraxia (IDD).” Infants and Young Children. Abramsky L, Chapple J. (1997). 47,XXY (Klinefelter syndrome) and 47,XYY: Estimated rates of and indicated for postnatal diagnosis
{"page_id": 34400157, "title": "The Focus Foundation"}
moral code, as well as rules for interacting with the natural environment ... [it] provides for a total, integrated way of life ... a lived daily reality". It embraces past, present and future. Another definition suggests that it represents "the relationship between people, plants, animals and the physical features of the land; the knowledge of how these relationships came to be, what they mean and how they need to be maintained in daily life and in ceremony". According to Simon Wright, "jukurrpa has an expansive meaning for Warlpiri people, encompassing their own law and related cultural knowledge systems, along with what non-Indigenous people refer to as 'dreaming'". A dreaming is often associated with a particular place, and may also belong to specific ages, gender or skin groups. Dreamings may be represented in artworks, for example "Pikilyi Jukurrpa" by Theo (Faye) Nangala represents the Dreaming of Pikilyi (Vaughan Springs) in the Northern Territory, and belongs to the Japanangka/ Nanpanangka and Japangardi/ Napanangka skin groups. == Aboriginal beliefs and culture == Related entities are known as Mura-mura by the Dieri and as Tjukurpa in Pitjantjatjara. "Dreaming" is now also used as a term for a system of totemic symbols, so that an Aboriginal person may "own" a specific Dreaming, such as Kangaroo Dreaming, Shark Dreaming, Honey Ant Dreaming, Badger Dreaming, or any combination of Dreamings pertinent to their country. This is because in the Dreaming an individual's entire ancestry exists as one, culminating in the idea that all worldly knowledge is accumulated through one's ancestors. Many Aboriginal Australians also refer to the world-creation time as "Dreamtime". The Dreaming laid down the patterns of life for the Aboriginal people. Creation is believed to be the work of culture heroes who travelled across a formless land, creating sacred sites and significant places of interest
{"page_id": 94623, "title": "The Dreaming"}
The Media Object Server (MOS) protocol allows newsroom computer systems (NRCS) to communicate using a standard protocol with video servers, audio servers, still stores, and character generators for broadcast production. The MOS protocol is based on XML. It enables the exchange of the following types of messages: Descriptive Data for Media Objects. The MOS "pushes" descriptive information and pointers to the NRCS as objects are created, modified, or deleted in the MOS. This allows the NRCS to be "aware" of the contents of the MOS and enables the NRCS to perform searches on and manipulate the data the MOS has sent. Playlist Exchange. The NRCS can build and transfer playlist information to the MOS. This allows the NRCS to control the sequence that media objects are played or presented by the MOS. Status Exchange. The MOS can inform the NRCS of the status of specific clips or the MOS system in general. The NRCS can notify the MOS of the status of specific playlist items or running orders. MOS was developed to reduce the need for the development of device specific drivers. By allowing developers to embed functionality and handle events, vendors were relieved of the burden of developing device drivers. It was left to the manufacturers to interface newsroom computer systems. This approach affords broadcasters flexibility to purchase equipment from multiple vendors. It also limits the need to have operators in multiple locations throughout the studio as, for example, multiple character generators (CG) can be fired from a single control workstation, without needing an operator at each CG console. MOS enables journalists to see, use, and control media devices inside Associated Press's ENPS system so that individual pieces of newsroom production technology speak a common XML-based language. == History of MOS == The first meeting of the MOS protocol
{"page_id": 35525984, "title": "Media Object Server"}
Lake Chichoj is located near the city of San Cristóbal Verapaz, in the department of Alta Verapaz, in Guatemala. It is 1 km (0.62 mi) long, 0.5 km (0.31 mi) wide, with an area of 0.5 km2 (0.19 sq mi), an average water volume of (4.8±0.1)×106 m3 [(1.7±0.04)×108 cu ft], and a maximum depth of 32 m (105 ft). == Location and catchment == Lake Chichoj is located in the municipality of San Cristóbal Verapaz, department of Alta Verapaz, in Guatemala. The catchment of lake has been designated as a Protected Area, in an attempt to protect the lake from environmental degradation. Water routing through the catchment is made complex by karstic groundwater flow. It is estimated that the catchment of the lake drains 21.0–23.5 km2 (8.1–9.1 sq mi). The lake in turn drains superficially to the Cahabón River, which flows to the Atlantic Ocean via Lake Izabal. == Legends surrounding the catastrophic formation of the lake == According to a few oral traditions from San Cristóbal Verapaz, the lake would have formed catastrophically by ground collapse during an earthquake in the early 16th Century, soon after the arrival of the Dominican friars (around 1525 CE), engulfing a church and its surrounding Maya settlement. The cataclysm has been explained as a divine punishment imparted to the inhabitants of San Cristóbal Caccoh, following the expulsion of a Dominican friar and the refusal of the inhabitants to submit to the Christian faith. This tradition is echoed in a book published in 1648 CE by the Irish Dominican friar Thomas Gage: "The English-American, or a New Survey of the West Indies". Gage's book suffers many exaggerations, casting doubt on the validity of his testimony. However, an independent report by Spanish Dominicans also mentions the sudden formation of a lake near San Cristóbal, by
{"page_id": 56011748, "title": "Lake Chichoj"}
774–775 carbon-14 spike, which was around 1.7 times as strong than the 993–994 event. Both events also had subsequent 10Be spikes, which further proves that they are from strong solar activity. == See also == List of solar storms 774–775 carbon-14 spike Miyake event == References ==
{"page_id": 48508353, "title": "993–994 carbon-14 spike"}
TADIG code is a number uniquely identifying network operators in a GSM mobile network. The acronym TADIG expands to "Transferred Account Data Interchange Group". According to the GSM specification, the codes are used as "primary identifiers within file contents and file names" in multiple file formats defined by the GSMA. Network operators are required to register new codes and limit themselves to using code already registered with the GSMA. TADIG codes are generally used by bilateral agreement for the purposes of billing roaming telephone calls. == Format == A TADIG code is 5 characters long, consisting of Three-character country code. This is usually the ISO 3166-1 alpha-3 code for terrestrial operators. Non-terrestrial operators have the first two characters as AA. Wi-Fi operators have the first two characters as WW. Two-character operator/ company identifier === Example === TADIG code: CANGW (for Freedom Mobile, formerly WIND Mobile) TADIG code: SWE01 (for the Sweden1 bilateral Roaming Hub) TADIG code: USAHI (for Mobi) == Notable exceptions == The GSMA specification lists the following in their list of "known issues" as discrepancies between codes registered with them against ones actually being used US territories are not always represented in the USA YUG continues to be used as country code by operators in Montenegro and Serbia. Each now has its own ISO code, MNE and SRB respectively Kosovo is not recognised as a country within the ITU. As a placeholder, the value K00 is used to represent the country == References ==
{"page_id": 55565392, "title": "TADIG code"}
into the larynx and allows for biopsies to be taken. Given the high likelihood of cancer, antibiotics (B) or reassurance (C) would be inappropriate. ##### 16. Answer B This patient’s presentation is concerning for mucormycosis, most commonly caused by _Rhizopus_ or _Mucor_ fungi. Patients with poorly controlled diabetes and/or neutropenia are the most common groups affected with mucormycosis. They most often present with local invasion of the fungi into the facial sinuses and eventually the brain (e.g., sudden onset or worsening of headache), as in this patient. Black eschar on the nose and discharge from the nares is characteristic of mucormycosis. Management consists of immediate antifungal therapy with liposomal amphotericin B and surgical debridement. Antifungal therapy alone would be inappropriate, as well as antibiotics (A,C–D). Hyperbaric oxygen (E) is currently being investigated as an adjunctive therapy for select patients with mucormycosis. Mortality for mucormycosis ranges from 50 % to 75%. ### Hepatopancreaticobiliary Areg Grigorian with 12 % bands, amylase of 180 μ/L (normal 30–110 μ/L), lipase of 55 μ/L (7–60 μ/L), alkaline phosphatase of 70 μ/L
{"source": 1498, "title": "from dpo"}
vertical line segments show the range of the result values. Significant improvements can be seen in transferability in filtering cases compared to the cases without filtering (at 2N the difference is large). Similarly to accuracy, the 2N labeling method is capable of training a model that can operate on a nearly constant transferability regardless of the attack amplitude. The filtered transferability for 2N labeling is almost zero in all cases, for every attack amplitude; thus, we were able to achieve an almost ideal defense. This means that even when an adversarial example overpasses the filter, our model will be misled by the attack with a very low probability. **Fig. 8** ![Image 8: figure 8 5 times less than the second-best NULL labeling on GTSRB, and (ii) 3 times smaller than the second-best BIN+DISTILL method on CIFAR-10. We examined the values in Table 5. The detailed results of the hypothesis tests are seen in the [Appendix]( in Table ( it can be concluded that the 2N labeling method is significantly better than the competitor methods. **Table 5 Mean transferability for each method if the attacks are sampled from a uniform distribution [0, 0.5]** [Full size table]( 7 Conclusion ------------ The adversarial attack is an actual and frequently researched topic in machine learning literature. Our innovative approach in this literature was the concept
{"source": 3876, "title": "from dpo"}
. . . . . . . . . . . . . . 9-18 9.2.3 Cohesive subgroups . . . . . . . . . . . . . . . . . . . . 9-24 9.2.4 Affiliation networks . . . . . . . . . . . . . . . . . . . . 9-30 9.3 Equivalence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-33 9.3.1 Structural equivalence . . . . . . . . . . . . . . . . . . . 9-33 9.3.2 Automorphic equivalence . . . . . . . . . . . . . . . . . 9-36 9.3.3 Regular equivalence . . . . . . . . . . . . . . . . . . . . 9-37 Mathematical notations N-1 Index I-1 Bibliography B-1 Copyrighted material - January 2010 - Draft Copyrighted material - January 2010 - Draft Copyrighted material - January 2010 - Draft Copyrighted material - January 2010 - Draft PREFACE When I was appointed Director of Education for the Computer Science de-partment at VU University, I became partly responsible for revitalizing our CS curriculum. At that point in time, mathematics was generally experi-enced by most students as difficult, but even more important, as being ir-relevant for successfully completing your studies. Despite numerous efforts from my colleagues from the Mathematics department, this view on math-ematics has never really changed. I myself obtained a masters degree in Applied Mathematics (and in particular Combinatorics) before switching to Computer Science and gradually moving into the field of large-scale dis-tributed systems. My own research is by
{"source": 4215, "title": "from dpo"}
conditions. Charred organic material is more resistant to deterioration, since it is only susceptible to chemical breakdown, which takes a long time (Weiner 2010). Due to the essential use of fire for many anthropogenic activities, carbonized remains constitute the most common type of plant macrofossil recovered from archaeological sites. This mode of preservation, however, tends to be biased towards plant remains that come into direct contact with fire for cooking or fuel purposes, as well as those that are more robust, such as cereal grains and nut shells. Waterlogged: Preservation of plant material can also occur when it is deposited in permanently wet, anoxic conditions, because the absence of oxygen prohibits microbial activity. This mode of preservation can occur in deep archaeological features, such as wells, and in lakebed or riverbed sediments adjacent to settlements. A wide range of plant remains are usually preserved as waterlogged material, including seeds, fruit stones, nutshells, leaves, straw and other vegetative matter. Desiccated: Another mode by which plant material can be preserved is desiccation, which only occurs in very arid environments, such as deserts, where the absence of water limits decomposition of organic matter. Desiccated plant remains are a rarer recovery, but an incredibly important source of archaeological information, since all types of plant remains can survive, even very delicate vegetative attributes, such as onion skins and crocus stigmas (saffron), as well as woven textiles, bunches of flowers and entire fruits. Mineralized: Plant material can also preserve in the archaeological record when its soft organic tissues are completely replaced by inorganic minerals. There are two types of mineralization processes. The first, 'biomineralization,' occurs when certain plant remains, such as the fruits of Celtis sp. (hackberry) or nutlets of the Boraginaceae family, naturally produce increased amounts of calcium carbonate or silica throughout their growth, resulting
{"page_id": 327940, "title": "Paleoethnobotany"}
based on Paschen's experimental observations. The peak value of this curve, as determined by setting the derivative of the equation equal to zero and solving, occurs at a wavelength λ max = h c 5 k B T ≈ 0.2878 c m ⋅ K T , {\displaystyle \lambda _{\text{max}}={\frac {hc}{5k_{\text{B}}T}}\approx {\frac {\mathrm {0.2878~cm\cdot K} }{T}},} and frequency ν max = 3 k B T h ≈ 6.25 × 10 10 H z K ⋅ T . {\displaystyle \nu _{\text{max}}={\frac {3k_{\text{B}}T}{h}}\approx \mathrm {6.25\times 10^{10}~{\frac {Hz}{K}}} \cdot T.} == Relation to Planck's law == The Wien approximation was originally proposed as a description of the complete spectrum of thermal radiation, although it failed to accurately describe long-wavelength (low-frequency) emission. However, it was soon superseded by Planck's law, which accurately describes the full spectrum, derived by treating the radiation as a photon gas and accordingly applying Bose–Einstein in place of Maxwell–Boltzmann statistics. Planck's law may be given as I ( ν , T ) = 2 h ν 3 c 2 1 e h ν k T − 1 . {\displaystyle I(\nu ,T)={\frac {2h\nu ^{3}}{c^{2}}}{\frac {1}{e^{\frac {h\nu }{kT}}-1}}.} The Wien approximation may be derived from Planck's law by assuming h ν ≫ k T {\displaystyle h\nu \gg kT} . When this is true, then 1 e h ν k T − 1 ≈ e − h ν k T , {\displaystyle {\frac {1}{e^{\frac {h\nu }{kT}}-1}}\approx e^{-{\frac {h\nu }{kT}}},} and so the Wien approximation gets ever closer to Planck's law as the frequency increases. == Other approximations of thermal radiation == The Rayleigh–Jeans law developed by Lord Rayleigh may be used to accurately describe the long wavelength spectrum of thermal radiation but fails to describe the short wavelength spectrum of thermal emission. == See also == ASTM Subcommittee E20.02 on Radiation Thermometry Sakuma–Hattori equation
{"page_id": 4677186, "title": "Wien approximation"}
before it becomes apparent. == Sensory compounds and impacts == The major volatile compounds responsible for smoke taint include guaiacol and methylguaiacol. Others include ortho-, meta- and para-cresol as well as syringol and methylsyringol. There are a number of enological laboratories around the world that can analyze for the presence of these compounds and help potentially affected wineries interpret the results. Similar to cork taint, a wine can suffer from a minor, barely detectable case of smoke taint or it can be so obvious as to render the wine undrinkable. Descriptors for the smell and taste of a smoke tainted wine include smoky, wood smoke, chargrill, smoked meats, bacon and ashtray. The taste tends to be persistent, lingering long after the wine has been spat out or swallowed. Some smoke-taint compounds can be very similar to oak-aging compounds, especially if a wine has been aged in oak with a high level of toast. There is some anecdotal evidence that smoke taint can also impact the texture of wine, resulting in what some describe as a "hard" finish. == Treatments == Berries, grape juice and wine can be tested for the presence of volatile phenols indicating smoke taint, the primary markers being guaiacol and 4-methylguaiacol. If found, there are measures that can be taken to minimize, remove/reduce or counterbalance the impact of smoke taint at various stages of the winemaking process. Common treatments include minimizing skin contact and maceration, adding enological tannins and/or oak chips to contribute to structure and counterbalance the impact of smoke taint, and the use of fining and/or filtration to remove/reduce some of the smoke compounds. == References ==
{"page_id": 67879419, "title": "Smoke taint"}
Dynamic Packet Transport (DPT) is a Cisco transport protocol designed for use in optical fiber ring networks. In overview, it is quite similar to POS and DTM. It was one of the major influences on the Resilient Packet Ring/802.17 standard. == Protocol design == DPT is implemented as two counter-rotating rings. This means the network is composed of two completely separate rings of fiber that are both able to transmit data concurrently. This design provides for redundancy in case of a fiber cut or link failure, and increased throughput in common situations. DPT as opposed to POS or normal SONET/SDH is able to use both rings at the same time whereas POS only uses one ring under normal circumstances but switches to the second upon failure of the first. Cisco claims that DPT can run with double the bit-rate of POS due to this characteristic. DPT is not a PPP whereas POS is, this means that traffic between two nodes of a DPT ring does not affect intermediate nodes. With the introduction of DPT came the introduction of another Cisco developed MAC layer protocol, Spatial Reuse Protocol or SRP. The use of SRP in conjunction with DPT makes it possible for DPT to communicate with the physical layer. == Types of data in DPT networks == As with most other lower layer protocols, there are methods for communicating not only application data between the nodes of a DPT network. It is necessary for the nodes to be able to communicate control data between each other in case of a fiber cut or link failure so the nodes can forward traffic on the appropriate interfaces and maintain network connectivity. Both control packets, and data packets are transmitted on both rings in order to maintain connectivity and full bandwidth utilization in normal
{"page_id": 5778780, "title": "Dynamic Packet Transport"}
The Cape Cod Canal is an artificial waterway in Massachusetts connecting Cape Cod Bay in the north to Buzzards Bay in the south, and is part of the Atlantic Intracoastal Waterway. The approximately 7.4-mile-long (11.9 km) canal traverses the neck of land joining Cape Cod to the state's mainland. It mostly follows tidal rivers widened to 480 feet (150 m) and deepened to 32 feet (9.8 m) at mean low water, shaving up to 135 miles (217 km) off the journey around the cape for its approximately 14,000 annual users. Most of the canal is located in the town of Bourne, but its northeastern terminus is in Sandwich. Scusset Beach State Reservation lies near the canal's north entrance, and the Massachusetts Maritime Academy is near its south. A swift-running current changes direction every six hours and can reach 5.2 miles per hour (8.4 km/h) during the receding ebb tide. The waterway is maintained by the United States Army Corps of Engineers and has no toll fees. It is spanned by the Cape Cod Canal Railroad Bridge, the Bourne Bridge, and the Sagamore Bridge. Traffic lights at either end govern the approach of vessels over 65 feet (20 m). The canal is occasionally used by whales and dolphins, including endangered North Atlantic right whales, which can cause closure of the canal. == History == Construction of a canal was first considered by Myles Standish of the Plymouth Colony in 1623, and the Pilgrims scouted the low-lying stretch of land between the Manomet and Scusset rivers for potential routes. William Bradford established the Aptucxet Trading Post in 1627 at the portage between the rivers. Trade prospered with the Indians of Narragansett Bay and the Dutch of New Netherland, and this was a major factor enabling the Pilgrims to pay off their debt.
{"page_id": 39772, "title": "Cape Cod Canal"}
William Bean (1787–1866) was an English geologist and conchologist. He was a pioneer of Yorkshire geology. In 1859, he sold his collection of over 15,000 fossils (mostly from localities around Scarborough). The majority of his collection was purchased by the British Museum and the Yorkshire Philosophical Society. Bean described several new species of Mollusca, including the whelk Beringius turtoni, named in honor of William Turton. Bean was associated with the Magazine of Natural History, and was a friend of Joshua Alder and Albany Hancock. == Selected publications == Bean, William (1839). "A Catalogue of the Fossils found in the Cornish Limestone of Scarborough". Magazine of Natural History. Vol. 3. pp. 57–62. == References == Ian Massey, 1978 The William Bean shell collection -Wood End Museum of Natural History, Scarborough Porcupine Newsletter Vol 1 No.6
{"page_id": 36246497, "title": "William Bean (geologist)"}
(ie. depression, apathy, and suicide). The long term duration of therapeutic benefit has not been clearly established, though reports suggest that individuals may have sustained clinical improvement for at least 10 years. There is usually a greater improvement in akinesia targeting the STN as compared to the pallidus, while there may be a wearing off of the initially excellent antiakinetic effect with pallidal stimulation after 5 years. Conversely, deep brain stimulation of the GPi has consistently shown superior and sustained reduction in dyskinesia. Although overall gait has been reported to improve consistently after DBS, postural instability, which can affect gait, is less likely to respond. A greater number of falls occur after surgery with DBS of the STN as compared to the GPi. GPi programming requires less-intensive monitoring of medication and stimulation adjustments in most patients. The STN has multiple motor, cognitive, and limbic pathways that are not completely anatomically segregated. In contrast, the larger size of the GPi motor region reduces the likelihood of the current spreading into adjacent functional areas or to the internal capsule, causing less neuropsychological side effects, long term comorbidities and global cognitive decline. This could be due to the GPi being separate from the limbic component of the STN, the greater dopamine reduction allowed with STN stimulation, or that the vast preponderance of studies in the literature are about the STN, causing an inadvertent publication bias. For individuals with unsatisfactory outcomes after DBS in Parkinson's, lead revision resulted in 30% improvement when leads were repositioned from the GPi to the STN, and no improvement when repositioned from the GPi to the STN. The cases in which improvement occurred were when there was clear evidence of lead mispositioning. A Bayesian analysis comparing DBS with intestinal levodopa, subcutaneous apomorphine and best medical therapy found DBS and
{"page_id": 370268, "title": "Deep brain stimulation"}
been reported. These laser treatments are painful and general anesthesia is required. A similar laser treatment has been used to clear silver particles from the eye, a condition related to argyria called argyrosis. The Agency for Toxic Substances and Disease Registry (ATSDR) describes argyria as a "cosmetic problem". One incident of argyria came to the public's attention in 2008, when a man named Paul Karason, whose skin turned blue from using colloidal silver for over 10 years to treat dermatitis, appeared on NBC's Today show. Karason died in 2013 at the age of 62 after a heart attack. Another example is Montana politician Stan Jones whose purposeful consumption of colloidal silver was a self-prescribed measure he undertook in response to his fears that the Y2K problem would make antibiotics unavailable, an event that did not occur. Colloidal silver may interact with some prescription medications, reducing the absorption of some antibiotics and thyroxine, among others. Some people are allergic to silver, and the use of treatments and medical devices containing silver is contraindicated for such people. Although medical devices containing silver are widely used in hospitals, no thorough testing and standardization of these products has yet been undertaken. == Water purification == Electrolytically dissolved silver has been used as a water disinfecting agent, for example, the drinking water supplies of the Russian Mir orbital station and the International Space Station. Many modern hospitals filter hot water through copper-silver filters to defeat MRSA and legionella infections.: 29 The World Health Organization (WHO) includes silver in a colloidal state produced by electrolysis of silver electrodes in water, and colloidal silver in water filters as two of a number of water disinfection methods specified to provide safe drinking water in developing countries. Along these lines, a ceramic filtration system coated with silver particles has
{"page_id": 149881, "title": "Medical uses of silver"}
many calories," "In reality, they are both driven by the same unhealthy, inequitable food systems, underpinned by the same political economy that is single-focused on economic growth, and ignores the negative health and equity outcomes. Climate change has the same story of profits and power,". Obesity was a medical problem for people who overconsumed food and worked too little already in ancient Rome, and its impact slowly grew through history. As to 2012, mortality from obesity was 3 times larger than from hunger, reaching 2.8 million people per year by 2017 Just as overconsumption of food has led to widespread health crises such as obesity and metabolic diseases, the overconsumption of fossil fuels has created an equally dire threat to both human health and the environment. Both forms of overconsumption stem from economic models that prioritize growth and short-term gains over long-term sustainability. While industrialized food systems have fueled rising obesity rates, the relentless burning of fossil fuels—especially coal—has exacerbated air pollution, climate change, and public health risks on a global scale. The overconsumption of fossil fuels, particularly coal, has profound implications for both environmental and human health. Burning fossil fuels releases a variety of harmful pollutants, including sulfur dioxide (SO₂), nitrogen oxides (NOₓ), particulate matter (PM), and carbon dioxide (CO₂). These emissions contribute to environmental issues such as acid rain, smog, and climate change, while also posing significant health risks. In addition, exposure to fine particulate matter (PM2.5) from fossil fuel combustion is associated with respiratory diseases, cardiovascular diseases, and premature mortality. A 2021 study estimated that fossil fuel-related air pollution is responsible for over 10 million premature deaths annually worldwide. Coal-fired power plants are particularly detrimental, emitting toxic substances that adversely affect human health. Communities near these plants experience higher rates of asthma, lung disease, and other health
{"page_id": 188418, "title": "Overconsumption (economics)"}
of media organizations to retain their funding. == Policy implications == === Technocracy vs. democracy === There are two schools of thought on how to cope with risks raised by availability cascades: technocratic and democratic. The technocratic approach, championed by Kuran and Sunstein, emphasizes assessing, prioritizing, and mitigating risks according to objective risk measures (e.g. expected costs, expected disability-adjusted life years (DALY)). The technocratic approach considers availability cascades to be phenomena of mass irrationality that can distort or hijack public policy, misallocating resources or imposing regulatory burdens whose costs exceed the expected costs of the risks they mitigate. The democratic approach, championed by Paul Slovic, respects risk preferences as revealed by the availability market. For example, though lightning strikes kill far more people each year than shark attacks, if people genuinely consider death by shark worse than death by lightning, a disproportionate share of resources should be devoted to averting shark attacks. === Institutional safeguards === Kuran and Sunstein recommend that availability cascades be recognized, and institutional safeguards be implemented in all branches of government. They recommend expanded product defamation laws, analogous to personal libel laws, to discourage availability entrepreneurs from knowingly spreading false and damaging reports about a product. They recommend that the legislative branch create a Risk Regulation Committee to assess risks in a broader context and perform cost-benefit analyses of risks and regulations, avoiding hasty responses pandering to public opinion. They recommend that the executive branch use peer review to open agency proposals to scrutiny by informed outsiders. They also recommend the creation of a Risk Information Center with a Risk Information Web Site to provide the public with objective risk measures. In the United States, the Centers for Disease Control and Prevention and the Federal Bureau of Investigation maintain web sites that provide objective statistics on
{"page_id": 19887527, "title": "Availability cascade"}
a Soldier’s possession, medications should be turned in to a central location and the Soldier will take doses under supervision. For medications held by the unit, commanders must establish a local policy for the security of the medications, especially in cases of controlled TRADOC Regulation 350-6 142 substances, and permit for the Soldier to handle the prescription bottle and dispense the medication himself or herself. (c) Medication will be stored in a double-locked area whose sole purpose is intended for the distribution of such medication. Coordination must be made with the local medical treatment facility for proper disposal of unused and expired medication. (d) Commanders and other permanent party personnel must be aware of restricted/ confidential reporting option available to Soldiers in accordance with AR 600-20 for sexual assault prevention and response (SAPR)/SHARP) reporting. When collecting pre-sick call information from Soldiers, the SAPR/SHARP program limits the extent of this questioning and protects the type of information the Soldier chooses to divulge. See AR 600-20 for details on the commander’s responsibility for assuring privacy and providing confidential disclosure options for Soldiers through restricted reporting. Failure to adhere to this policy could subject the individual found to have violated the SAPR/SHARP policy to disciplinary action (2) DA Form 3349 is used to record profiles in excess of 7 days in duration. Temporary profiles written on DA Form 3349 will not exceed three months in duration, except in specific circumstances in accordance with AR 40 -501 . (3) In cases of accident or injury, the company commander or 1SG uses DD Form 689 . For NG/USAR Trainees/Soldiers, a DA Form 2173 will also be initiated. Units will ensure that all individuals injured during training or mission sustainment report to troop medical facilities with a completed DD Form 689 . The supervisor (military or
{"source": 86, "title": "from dpo"}
uses an array of the style of Figure J.28 but uses radix-8 Booth recoding, which means it must compute 3 times the multiplier. The three multiplier pipeline stages are (1) compute 3 b, (2) pass through array, and (3) final carry-propagation add and round. Single preci-sion passes through the array once, double precision twice. Like addition, the latency is two cycles. The Weitek chip uses an interesting addition algorithm. It is a variant on the carry-skip adder pictured in Figure J.18 (page J-42). However, P ij , which is the logical AND of many terms, is computed by rippling, performing one AND per ripple. Thus, while the carries propagate left within a block, the value of P ij is propagating right within the next block, and the block sizes are chosen so that both waves complete at the same time. Unlike the MIPS chip, the 3364 has hardware square root, which shares the divide hardware. The ratio of double-precision multiply to divide is 2:17. The large disparity between multiply and divide is due to the fact that multiplication uses radix-8 Booth recoding, while division uses a radix-4 method. In the MIPS R3010, multiplication and division use the same radix. The notable feature of the TI 8847 is that it does division by iteration (using the Goldschmidt algorithm discussed in Section J.6). This improves the speed of division (the ratio of multiply to divide is 3:11), but means that multiplication and division cannot be done in parallel as on the other two chips. Addition has a two-stage pipeline. Exponent compare, fraction shift, and fraction addition are done in the first stage, normalization and rounding in the second stage. Multiplication uses a binary tree of signed-digit adders and has a three-stage pipeline. The first stage passes through the array, retiring half the
{"source": 2299, "title": "from dpo"}
ion of insert/2 .1 An y insert/2 su bgoal wit h a non-empt y s econ d argu men t will match wit h e it her cla us e of the de nit ion. Prolog alw ays ap plie s the rst cla us e an d only revi s e s that choice up on bac ktrac kin g ca us e d by thenal li st not meet in g the ordered/1 con dit ion. Th e Dolphin syst em (Zelle & Mo on ey , 1993a) can autom atically transform thi s O (n!) sort in g algor it hm in to on e whic h ru ns in O (n2 ) tim e by lear nin g f rom a s in gle top-lev el example. Table 2.1 sh ows som e con trol example s charact er izin gthe us efuln e ss of the rst cla us e of insert ; the s e con trol example s are gen era te d byan alyzin g a trace of the program solvin g the goal sort([9,1, 5, 3,4 ],X ). Th e p os it iv econ trol example s are su bgoals to whic h the rst cla us e of insert/2 was ap plie d in the fou nd pro of. Th e nega tiv e example s repre s en t su bgoals for whic h the rst cla us ewas init ially tr ie d bu t la ter bac ktrac ke d over in f avor of the s econ d cla us e. Dolphin ,whic h us e s a com bin ation of SBL an d EBL met ho ds, lear ns a two-cla us e con trol-rule for thi s concept: > useful insert 1(insert(A,[],[A])
{"source": 4932, "title": "from dpo"}
say simply ` S = 7' for the event that a 7 was rolled, and ` S = 4' for the event f q qqq , q q q q , qqq q g.A random variable can be characterized by the probability distribution of its values. Thus, for example, S takes on eleven possible values f2, 3, . . . , 12 g,and we can tabulate the probability that S = s for each s in this set: s 2 3 4 5 6 7 8 9 10 11 12 Pr 00 (S = s) 136 236 336 436 536 636 536 436 336 236 136 Pr 11 (S = s) 464 464 564 664 764 12 64 764 664 564 464 464 If we're working on a problem that involves only the random variable S and no other properties of dice, we can compute the answer from these probabilities alone, without regard to the details of the set Ω = D2. In fact, we could de ne the probability space to be the smaller set Ω = f2, 3, . . . , 12 g, with whatever probability distribution Pr (s) is desired. Then ` S = 4' would be an elementary event. Thus we can often ignore the underlying probability space Ω and work directly with random variables and their distributions. If two random variables X and Y are de ned over the same probabil-ity space Ω, we can characterize their behavior without knowing everything 384 DISCRETE PROBABILITY about Ω if we know the \joint distribution" Just Say No. Pr (X = x and Y = y) for each x in the range of X and each y in the range of Y. We say that X and Y are independent random variables if Pr (X = x
{"source": 6137, "title": "from dpo"}
two reasons: There is no way to obtain mass – or anything derived from it, such as force – without introducing another base dimension (thus, they do not span the space). Velocity, being expressible in terms of length and time (V = L/T), is redundant (the set is not linearly independent). === Other fields of physics and chemistry === Depending on the field of physics, it may be advantageous to choose one or another extended set of dimensional symbols. In electromagnetism, for example, it may be useful to use dimensions of T, L, M and Q, where Q represents the dimension of electric charge. In thermodynamics, the base set of dimensions is often extended to include a dimension for temperature, Θ. In chemistry, the amount of substance (the number of molecules divided by the Avogadro constant, ≈ 6.02×1023 mol−1) is also defined as a base dimension, N. In the interaction of relativistic plasma with strong laser pulses, a dimensionless relativistic similarity parameter, connected with the symmetry properties of the collisionless Vlasov equation, is constructed from the plasma-, electron- and critical-densities in addition to the electromagnetic vector potential. The choice of the dimensions or even the number of dimensions to be used in different fields of physics is to some extent arbitrary, but consistency in use and ease of communications are common and necessary features. === Polynomials and transcendental functions === Bridgman's theorem restricts the type of function that can be used to define a physical quantity from general (dimensionally compounded) quantities to only products of powers of the quantities, unless some of the independent quantities are algebraically combined to yield dimensionless groups, whose functions are grouped together in the dimensionless numeric multiplying factor. This excludes polynomials of more than one term or transcendental functions not of that form. Scalar arguments
{"page_id": 8267, "title": "Dimensional analysis"}
of an L=3 dimensional cube, with each edge of the cube specifying a mutation path in which the change Hamming distance is either zero or ±1. It can be seen that, for example, one third of the mutations of the [001] molecules will produce [000] molecules, while the other two thirds will produce the class 2 molecules [011] and [101]. We can now write the expression for the child populations n i ′ {\displaystyle n'_{i}} of class i in terms of the parent populations n j {\displaystyle n_{j}} . n i ′ = ∑ j = 0 3 w i j n j {\displaystyle n'_{i}=\sum _{j=0}^{3}w_{ij}n_{j}} where the matrix 'w’ that incorporates natural selection and mutation, according to quasispecies model, is given by: w = [ a ⋅ Q 3 a ⋅ μ 0 0 μ Q 2 μ 0 0 2 μ Q μ 0 0 3 μ Q ] {\displaystyle \mathbf {w} ={\begin{bmatrix}a\cdot Q&3a\cdot \mu &0&0\\\mu &Q&2\mu &0\\0&2\mu &Q&\mu \\0&0&3\mu &Q\end{bmatrix}}} where Q = ( 1 − μ ) L {\displaystyle Q=(1-\mu )^{L}} is the probability that an entire molecule will be replicated successfully. The eigenvectors of the w matrix will yield the equilibrium population numbers for each class. For example, if the mutation rate μ is zero, we will have Q=1, and the equilibrium concentrations will be [ n 0 , n 1 , n 2 , n 3 ] = [ 1 , 0 , 0 , 0 ] {\displaystyle [n_{0},n_{1},n_{2},n_{3}]=[1,0,0,0]} . The master sequence, being the fittest will be the only one to survive. If we have a replication fidelity of Q=0.95 and genetic advantage of a=1.05, then the equilibrium concentrations will be roughly [ 0.33 , 0.38 , 0.24 , 0.06 ] {\displaystyle [0.33,0.38,0.24,0.06]} . It can be seen that the master sequence is
{"page_id": 2915834, "title": "Error threshold (evolution)"}
TSH-T3 shunt is a feed-forward mechanism of the hypothalamic–pituitary–thyroid axis (HPT axis) in which pituitary thyroid-stimulating hormone (TSH) directly augments secretion of the biologically active thyroid hormone triiodothyronine (T3) by the thyroid gland. Besides stimulating production of the pro-hormone thyroxine (T4), TSH up-regulates intrathyroidal deiodination of T4 to T3 via type II iodothyronine deiodinase (DIO2), effectively “shunting” part of the gland’s T4 output into active T3 before release. The pathway buffers circulating free T3 (FT3) against fluctuations in thyroid output and contributes to the circadian rhythm of serum T3. Recognition of a TSH-T3 shunt has refined models of thyroid homeostasis and influences interpretation of thyroid function tests and the management of hypothyroidism. == Background == In euthyroid adults about 80 % of circulating T3 arises from peripheral deiodination of T4, while ~20 % is secreted directly by the thyroid. Under high TSH drive – for example in iodine deficiency or after exogenous TSH administration – the thyroidal fraction of T3 secretion rises substantially. == Mechanism == === Intrathyroidal deiodination === TSH activates cAMP-dependent signalling that stimulates expression and activity of DIO2 (and to a lesser extent DIO1) in follicular cells, promoting rapid conversion of stored T4 to T3 and increasing the T3:T4 ratio of secreted hormone. TSH concurrently shortens thyroglobulin residence time, favouring release of newly formed T3. === Quantitative contribution === Mathematical sensitivity analysis places the shunt gain (GT) at 15–30 pmol s−1 / 109 thyrocytes, sufficient to stabilise FT3 against ±30 % changes in T4 output. == Physiological role == The shunt acts as a buffering, feed-forward element complementing negative feedback by thyroid hormones on TSH secretion. In population studies FT3 varies little across a six-fold range of TSH, whereas FT4 shows a strong log-linear inverse relationship with TSH. The shunt therefore underlies the relative constancy of T3
{"page_id": 80012710, "title": "TSH-T3 shunt"}
is one that involves the use of energy to cool something, as opposed to passive cooling that uses no energy. Such systems circulate a coolant to transfer heat from one place to another. The coolant is either a gas, such as in air cooling of computers, or a liquid such as in a car engine. In the latter case, liquid is pumped to transfer heat from the engine to the radiator, which in turn is cooled by passing air over it. Other active cooling systems make use of a refrigeration cycle. Actual mechanical advantage – The actual mechanical advantage (AMA) is the mechanical advantage determined by physical measurement of the input and output forces. AMA takes into account energy loss due to deflection, friction, and wear. Adjoint equation – is a linear differential equation, usually derived from its primal equation using integration by parts. Gradient values with respect to a particular quantity of interest can be efficiently calculated by solving the adjoint equation. Methods based on solution of adjoint equations are used in wing shape optimization, fluid flow control and uncertainty quantification. For example d X t = a ( X t ) d t + b ( X t ) d W {\displaystyle dX_{t}=a(X_{t})dt+b(X_{t})dW} this is an Itō stochastic differential equation. Now by using Euler scheme, we integrate the parts of this equation and get another equation, X n + 1 = X n + a Δ t + ζ b Δ t {\displaystyle X_{n+1}=X_{n}+a\Delta t+\zeta b{\sqrt {\Delta t}}} , here ζ {\displaystyle \zeta } is a random variable, later one is an adjoint equation. Aerodynamics – the study of the motion of air, particularly its interaction with a solid object, such as an airplane wing. It is a sub-field of fluid dynamics and gas dynamics, and many aspects
{"page_id": 50783328, "title": "Glossary of mechanical engineering"}
DASH7 is being developed for "smart" billboards and kiosks, likewise "smart" posters that can be read from many meters (or even kilometers) away, creating new opportunities for both tracking the effectiveness of advertising expenditures, but also creating new e-commerce opportunities. DASH7's potential to automate check-ins and check-outs provides essential infrastructure to location-based advertising and promotions Automotive — DASH7 is increasingly seen as the next-generation tire-pressure monitoring system (TPMS), given its operation at the same frequency (433 MHz) as nearly all proprietary TPMS today. DASH7-based TPMS will provide end users with more accurate tire pressure readings, resulting in greater fuel economy, reduced tire wear, and greater safety. DASH7 products are also being designed and used for other automotive applications like supply chain visibility. Logistics — DASH7 is being used today for tracking the whereabouts of shipping containers, pallets, roll cages, trucks, rail cars, maritime vessels, and other supply chain assets, providing businesses with unprecedented visibility into their everyday operations. Also cold chain management (vaccines, fresh produce, cut flowers, etc.), whereby DASH7 is used for monitoring the in-transit temperature and other environmental factors that can adversely affect the integrity of sensitive products. == Developer support == === OSS-7: Dash7 open-source stack === The goal of the project is to provide a reference implementation of the DASH7 Alliance protocol. This implementation should focus on completeness, correctness and being easy to understand. Performance and code size are less important aspects. For clarity, a clear separation between the ISO layers is maintained in the code. The project is available on GitHub and is licensed under the Apache License, version 2.0. === OpenTag === DASH7 Mode 2 developers benefit from the open-source firmware library called OpenTag, which provides developers with a "C"-based environment in which to develop DASH7 applications quickly. So in addition to DASH7 (ISO
{"page_id": 24166643, "title": "DASH7"}
on November 7, 1910, the aircraft made a powered hop of 20 ft (6.1 m) over the Garden City aviation field with Didier Masson at the controls, but proved unable to sustain flight. Todd's career in airplane design ended abruptly after she was hired by Mrs. Sage in January 1911, despite Mrs. Sage's interest in aviation and the financing of Todd's biplane. == Later years == After the death of Mrs. Sage, Todd moved to Pasadena, California, during the first half of the 1920s, as noted in the Voter Registrations of 1924 and onward. She moved to Corona Del Mar, California, in 1936. Todd died on September 26, 1937, at Huntington Memorial Hospital in Pasadena. Her body was cremated and her remains were sent to New York where they were buried on June 8, 1938, in the Moravian Cemetery on Staten Island. == Cultural references == In 2013, director and animator Kristina Yee created a short film entitled "Miss Todd" with a student team at the National Film and Television School. "'Miss Todd' is a short, stop-motion, musical animation about the first woman in the world to build and design an airplane." The film is inspired by E. Lillian Todd. The film won the Foreign Film Award Gold Medal at the 2013 Student Academy Awards. Additionally, the team put out a book entitled "Miss Todd and Her Wonderful Flying Machine," published by Compendium, Inc. In 2015, the music artist Elizaveta released the video "Icarus," which entirely features animation from "Miss Todd." In 2020, Calkins Creek published a non-fiction picture book about Lilian Todd, WOOD, WIRE, WINGS: Emma Lilian Todd Invents an Airplane, by Kirsten W. Larson, illustrated by Tracy Subisak. The book is for ages seven and up. == References ==
{"page_id": 28131812, "title": "E. Lilian Todd"}
of these general types can be further divided into numerous variations. Electric drives generally include both an electric motor and a speed control unit or system. The term drive is often applied to the controller without the motor. In the early days of electric drive technology, electromechanical control systems were used. Later, electronic controllers were designed using various types of vacuum tubes. As suitable solid state electronic components became available, new controller designs incorporated the latest electronic technology. ==== DC drives ==== DC drives are DC motor speed control systems. Since the speed of a DC motor is directly proportional to armature voltage and inversely proportional to motor flux (which is a function of field current), either armature voltage or field current can be used to control speed. ==== Eddy current drives ==== An eddy current drive (sometimes called a "Dynamatic drive", after one of the most common brand names) consists of a fixed-speed motor (generally an induction motor) and an eddy current clutch. The clutch contains a fixed-speed rotor and an adjustable-speed rotor separated by a small air gap. A direct current in a field coil produces a magnetic field that determines the torque transmitted from the input rotor to the output rotor. The controller provides closed loop speed regulation by varying clutch current, only allowing the clutch to transmit enough torque to operate at the desired speed. Speed feedback is typically provided via an integral AC tachometer. Eddy current drives are slip-controlled systems the slip energy of which is necessarily all dissipated as heat. Such drives are therefore generally less efficient than AC/DC-AC conversion based drives. The motor develops the torque required by the load and operates at full speed. The output shaft transmits the same torque to the load, but turns at a slower speed. Since power
{"page_id": 2769817, "title": "Motor drive"}
The terms hold-in range, pull-in range (acquisition range), and lock-in range are widely used by engineers for the concepts of frequency deviation ranges within which phase-locked loop-based circuits can achieve lock under various additional conditions. == History == In the classic books on phase-locked loops, published in 1966, such concepts as hold-in, pull-in, lock-in, and other frequency ranges for which PLL can achieve lock, were introduced. They are widely used nowadays (see, e.g. contemporary engineering literature and other publications). Usually in engineering literature only non-strict definitions are given for these concepts. Many years of using definitions based on the above concepts has led to the advice given in a handbook on synchronization and communications, namely to check the definitions carefully before using them. Later some rigorous mathematical definitions were given in. === Gardner problem on the lock-in range definition === In the 1st edition of his well-known work, Phaselock Techniques, Floyd M. Gardner introduced a lock-in concept: If, for some reason, the frequency difference between input and VCO is less than the loop bandwidth, the loop will lock up almost instantaneously without slipping cycles. The maximum frequency difference for which this fast acquisition is possible is called the lock-in frequency. His notion of the lock-in frequency and corresponding definition of the lock-in range have become popular and nowadays are given in various engineering publications. However, since even for zero frequency difference there may exist initial states of loop such that cycle slipping may take place during the acquisition process, the consideration of initial state of the loop is of utmost importance for the cycle slip analysis and, therefore, Gardner’s concept of lock-in frequency lacked rigor and required clarification. In the 2nd edition of his book, Gardner stated: "there is no natural way to define exactly any unique lock-in frequency", and
{"page_id": 47611264, "title": "Phase-locked loop range"}
energy demand. Similarly, the carbon payback time (CPBT) measures the operational time needed for a solar cell to produce enough electricity that the avoided carbon emissions from the same amount of electricity generated with the usual energy mix is equal to the amount of carbon emissions the cell will generate over its lifetime. In other words, CPBT measures the time a solar cell needs to run in order to mitigate its own carbon emissions. These quantities depends on many factors, including where the solar cell is manufactured and deployed, as the typical energy mix varies from place to place. Therefore, the electricity-related emissions from the production process as well as the avoided electricity-related emissions from the solar-generated electricity during operation of the cell can vary depending on the particular module and application. The emissions from a cell may also depend on how the module is deployed, not just because of the raw materials and energy costs associated with the production of mounting hardware, but also from any avoided emissions from replaced building materials, as in the case of building-integrated photovoltaics where solar panels may replace building materials like roof tiles. Though energy-usage and emissions-related impacts are vital for evaluation of and comparison between technologies, they are not the only important quantities for evaluating the environmental impact of solar cells. Other important impact factors include toxic heavy metal emissions, metal depletion, human toxicity, various eco-toxicities (marine, freshwater, terrestrial), and acidification potential which measures the emission of sulfur and nitrogen oxides. Including a wide range of environmental impacts in a life cycle analysis is necessarily to minimize the chance of passing environmental impact from a prominent impact factor like greenhouse gas emission to a less prominent but still relevant impact factor like human toxicity. === Greenhouse gas emissions === Using established first-generation
{"page_id": 20386463, "title": "Thin-film solar cell"}
provide an appropriate space for sound technicians and the racks of audio equipment. Audio engineers will also provide advice on which audio components would best suit the space and its intended use, and on the correct placement and installation of these components. During the installation phase, audio engineers ensure that high-power electrical components are safely installed and connected and that ceiling or wall-mounted speakers are properly mounted (or "flown") onto rigging. When the sound reinforcement components are installed, the audio engineers test and calibrate the system so that its sound production will be even across the frequency spectrum. === System testing === A sound reinforcement system should be able to accurately reproduce a signal from its input, through any processing, to its output without any coloration or distortion. However, due to inconsistencies in venue sizes, shapes, building materials, and even crowd densities, this is not always possible without prior calibration of the system. This can be done in one of several ways. The oldest method of system calibration involves a set of healthy ears, test program material (i.e. music or speech), a graphic equalizer, and a familiarity with the desired frequency response. One must then listen to the program material through the system, take note of any noticeable frequency deviation or resonances, and correct them using the equalizer. Engineers typically use a familiar playlist to calibrate a new system. This by ear process is still done by many engineers, even when analysis equipment is used, as a final check of how the system sounds with music or speech playing through the system. Another method of manual calibration requires a pair of high-quality headphones patched into the input signal before any processing. One can then use this direct signal as a reference with which to identify any differences in frequency response.
{"page_id": 764380, "title": "Sound reinforcement system"}
lgspline Lagrangian Multiplier Smoothing Splines for Smooth Function Estimation lgtdl A Set of Methods for Longitudinal Data Objects LHD Latin Hypercube Designs (LHDs) lhmixr Fit Sex-Specific Life History Models with Missing Classifications lhs Latin Hypercube Samples libbib Various Utilities for Library Science/Assessment and Cataloging libcoin Linear Test Statistics for Permutation Inference libdeflate DEFLATE Compression and Static Library libgeos Open Source Geometry Engine ('GEOS') C API libimath 'Imath' Computer Graphics Linear Algebra Static Library LiblineaR Linear Predictive Models Based on the LIBLINEAR C/C++ Library libr Libraries, Data Dictionaries, and a Data Step for R Libra Linearized Bregman Algorithms for Generalized Linear Models librarian Install, Update, Load Packages from CRAN, 'GitHub', and 'Bioconductor' in One Step librarysnapshot Library Snapshot for Packages and Dependencies in Use by Current Session libstable4u Stable Distribution Functions...For You LIC The LIC Criterion for Optimal Subset Selection licoread Reads Raw Files from Li-COR Gas Analyzers lidaRtRee Forest Analysis with Airborne Laser Scanning (LiDAR) Data lidR Airborne LiDAR Data Manipulation and Visualization for Forestry Applications lievens Real-Time PCR Data Sets by Lievens et al. (2012) lifecontingencies Financial and Actuarial Mathematics for Life Contingencies lifecourse Quantification of Lifecourse Fluidity lifecycle Manage the Life Cycle of your Package Functions LifeHist Life History Models of Individuals LifeInsuranceContracts Framework for Traditional Life Insurance Contracts LifeInsureR Modelling Traditional Life Insurance Contracts lifelogr Life Logging LifemapR Data Visualisation on 'Lifemap' Tree lifepack Insurance Reserve Calculations lifeR Identify Sites for Your Bird List Lifertable Life and Fertility Tables Specially for Insects LifeTables Two-Parameter HMD Model Life Table System liftLRD Wavelet Lifting Estimators of the Hurst Exponent for Regularly and Irregularly Sampled Time Series liftr Containerize R Markdown Documents for Continuous Reproducibility LiftTest A Bootstrap Proportion Test for Brand Lift Testing lifx Control 'LIFX' Smart Light Bulbs lightAUC Fast AUC Computation lightgbm Light Gradient Boosting Machine LightLogR
{"source": 1025, "title": "from dpo"}
inaccurate by default, but also as a point of start that makes her hypothesis epistemologically problematic. Since we are stuck in the wrong view. Since Aristotle (or even before). The “essence” and “motion” of things have being troubling to philosophy in general… We have reached a point by which the mobility of things, (based on the definition of “motus” by Aristotle). Is the “true” driving nature of things, being currently the most accepted ontological proposition, since we live in a “christianized” worldview here in the West, what i mean is that the works of philosophers like Heidegger, Foucault and others standing in a point that rejects “essentialism”, have found great success since they align (directly or indirectly) with Plato. Augustus of Hippo believed that the Christian faith could be structured with Plato. And he did, but i have to say that he was more a NeoPlatonic. Viewing God as a the cause of good and as the seeker of the ones that separated themselves from him. Being the cause of the evil in the world that we decided to live in. Not surprising that this view was continued even to the XX century, even so Foucault’s work is ontologically compatible to Christianity. Since both are built around Plato’s cave. Even so, Foucault’s mistake and almost of every “denaturaliser” is the switch from the nihilistic thesis that knowledge it’s not possible, or to access to the “natural” is not possible, following Kant’s tradition. Some like to point to Kurt Gödel’s theorems as a prove of this. But as some logicians have demonstrated is that knowledge is possible, but rather that an absolute proof is impossible. Even so we can take the work of almost all logicians and then expose the incoherency of constructivism. As the article says, any biological system is
{"source": 2828, "title": "from dpo"}
privatem privaten privater privates privatfern privatfernsehen privathaushalte privathaushalten privatheit privatindustrie privatisation privatised privatiser privatisiert privatisierung privatize privatkanal privatkarte privatkonflikte privatleute privatleuten privatmensch privatnetzen privatnetzte privatperson privatpersonen privatpersonengruppenregelungen privatpersonenregelung privatpost privatrechtliche privatsachen privatschulen privatsky privatsphaere privatunternehmen privatunternehmens privatvergnuegen privatwirtschaftlich privatwirtschaftliche privatwirtschaftlichen prive prived privees priveledged priveledges privelidges priver prives privet privett privews privil priviledge priviledged priviledges privileg privilege privileged privileges privilegien privili privilige privitera privon privrata privs privy prix priya priyanka priyavrata prize prized prizer prizes prizewinning prj prk prkmpt prl prlb prm prmceb prmd prmgbl prmmbx prmpt prn pro proably proactive proactively prob probab probabilist probability probable probablement probably probala probally probate probation probationers probe probebetrieb probed probelm proben prober probers probert probes probeumfrage probier probiere probieren probiern probiert probierte probing probity probl proble problem problema problemanalyse problematic problematik problematiken problematisch problematische problematischen problematischer problembearbeitung problembereiche problembereichen problembewaeltigung problembewusstsein probleme problemen problemes problemfeld problemfelder problemgruppen problemkreise problemlagen problemloesung problemloesungen problemlos problempotential problems problemsituation problemstellung problms probs probst probsthain probw proc procaccini procaccio procaine procal procalc procca proccess proceded proceder procedural procedure procedures proceed proceeded proceeding proceedings proceeds proceedure proces process processed processes processeur processid processing procession processname processor processors processus procfil procfile prochain prochaine prochainnement prochains prochaska prochazka proche proches procid procider procissi proclaim proclaimed proclaimin proclaiming proclaims proclamation proclassic proclib proclivity procner procom procomm procotol procrastinate procrastinated procrastination procrastinator procreate procreatively procrustean procrustes procter proctologists proctor procure procured procurement procurements procurer procurez procuring procyon prod prodbm prodcedure prodded prodding prodigal prodigies prodigious prodigy prodmfg prodmgmt prodogy prodoor prodos prodromou produc produce produced producer producers produces producible producing produckt product production productions productive productively productivity products produise produit produites produkpalette produkt produktangebotes produktbeobachtungspflicht produktbeschreibung produktbewertungen produktbezogene produkte produkten produktentwicklung produktes produkthaftung produkthaftungsgesetz produktinfo produktinformationen produktion produktionen produktions produktionsgesellschaft produktionskapazitaeten produktionslinien produktionsstaette produktionstechniken produktionsunbahaengiges produktionswerken produktiv produktiven produktlinie produktlinien produktmangel produktorientierte
{"source": 5213, "title": "from dpo"}
There are 4-7 guest organizations who can nominate up to 3 individuals. * Each organization will nominate these applicants based on their contribution to their ecosystem in the following sectors: * Regenerative R&D * Education and growth * Operation * Impact on local communities and bioregion. * Each team and applicant must: * Agree to Gitcoin’s basic rules and code of conduct. * Provide the scope and validation of their claimed work. * Include how they aim to contribute to their respective community. * Each organization will present at least one member to represent them within the round operating team. **Marketing Plan:** * We also utilize other ecosystem partners to create a marketing funnel towards the round. * The platforms that will be utilized are, but not limited to: X, Warpcast, Discord, Discourse, and Telegram. * We will utilize Let’s Grow DAO’s proven X formula to amplify the round’s reach. * The plan is to continue hosting live X Spaces during the GG22 round. **Round History** This round will be the first of its kind for the Regen Coordi-NATION team. Apart from the recent grant round for Regen projects within the Greenpill, ReFI, and Celo ecosystem, we have not conducted a grant round specifically for our valued contributors. **GreenPill Network** * **GreenPill Network Round (November 2023):** 12 GreenPill Chapters, 3 ETH matching pool, and 403 donations totalling $988 in crowdfunding. Eligibility was to have minted a Hypercert with proof of your impact and to be an active Chapter. Round Report Card:** Eligibility for active Chapters and GPN-aligned projects was based on past work done - proof of impact in their work was needed to be accepted into the round. 1,808 donations were made to the round, totalling $5,550 in crowdfunding.[Round Report Card](
{"source": 6413, "title": "from dpo"}
commonly receive projections from GABAergic local interneurons. The horizontal interneurons show a laminar distribution of dendrites and are involved in axo-axonic synapses in the hippocampus, which get direct synaptic inputs from CA1 pyramidal cells. Thus, in general, these studies indicate that axo-axonic synapses can provide a basic mechanism of information processing in the cerebral cortex. === Basal ganglia === Microscopy studies in the striatum previously suggested rare occurrence of axo-axonic synapses in individual sections. Extrapolations from the topological data suggest much higher counts of such synapses in the striatum where the therapeutic role of the axo-axonic synapses in treating schizophrenia has been postulated previously. In this study, authors examined 4,811 synapses in rat striatum sections, and 15 of them were found to be the axo-axonic synapses. These axo-axonic synapses are formed by dopaminergic inhibitory interneurons (on the presynaptic side) projecting onto the axons of glutamatergic cortico-striatal fibers in the rat striatum. === Brainstem === Axo-axonic synapses are found in the spinal trigeminal nucleus in the brainstem. Electron microscopy studies on the kitten brainstem quantified synaptogenesis of axo-axonic synapses in the spinal trigeminal nucleus at different development ages of the brain. Authors identified the synapses by counting vesicles released in the synaptic cleft, which can be observed in the micrographs. Axo-axonic contacts are shown to consistently increase throughout the development period, starting from the age of 3 hours to the age of 27 days in kittens. The highest rate of synaptogenesis is during the first 3 to 6 days, at the end of which, the kitten's spinal trigeminal nucleus will have nearly half of the axo-axonic synapses present in adult cats. Later, between 16 and 27 days of age, there is another surge of axo-axonic synaptogenesis. Axo-axonic synapses are also observed in the solitary nucleus (also known as nucleus of the
{"page_id": 64176530, "title": "Axo-axonic synapse"}
organic pollutants such as dichlorodiphenyltrichloroethane (DDT), polychlorinated biphenols, dioxins, are all assessed in AOX analysis. Generally, the higher the amount of chlorine in an organic compound, the more toxic it is considered. While there are several biochemical or electrochemical methods to remove organic halides, AOX has been preferred due to its low cost of operation and simplicity of design. In a lab, the determination of AOX parameter consists of adsorption of organic halides from the sample on to an activated carbon. The activated carbon can be powdered or granular and adsorbed using microcolumns or a batch process, if the samples are rich in humic acids. Vigorous shaking is often employed in the event of a batch process to favor the adsorption of organic halide on to the activated carbon due to its electronegativity and presence of lone pairs. The inorganic halides that are also adsorbed are washed away using a strong acid such as nitric acid. The carbon with adsorbed organic halide is obtained by filtration, after which the filter containing the carbon is burnt in the presence of oxygen. While combustion of hydrocarbon part of the compounds form CO2 and H2O, halo acids are formed from the halogens. These haloacids are absorbed into acetic acid. Subsequent use of microcolumetric titration, an electrochemical quantification method, provides the AOX content in the sample. Using the dilution ratio, the total AOX content at the location can be estimated. Alternatively, the chlorinated compounds in the sample can be determined by using pentane extraction followed by capillary gas chromatography and electron capture (GC-ECD). The organic carbon that was remaining after the nitric acid purge can be analyzed using UV-persulfate wet oxidation followed by Infrared-detection (IR). Several other analytical techniques such as high performance liquid chromatography (HPLC) could also be implemented to quantify AOX levels.
{"page_id": 51487091, "title": "Adsorbable organic halides"}
condition such as Weyers acrodental dysostosis or Ellis–Van Creveld syndrome) are more common in Amish communities than in the American population at large. Maple syrup urine disease affects about one out of 180,000 infants in the general population. Due in part to the founder effect, however, the disease has a much higher prevalence in children of Amish, Mennonite, and Jewish descent. Similarly, a high frequency of fumarase deficiency exists among the 10,000 members of the Fundamentalist Church of Jesus Christ of Latter Day Saints, a community which practices both endogamy and polygyny, where an estimated 75–80% of the community are blood relatives of just two men—founders John Y. Barlow and Joseph Smith Jessop. In South Asia, castes like the Gujjars, the Baniyas and the Pattapu Kapu have estimated founder effects about 10 times as strong as those of Finns and Ashkenazi Jews. In Africa, many members of the Vadoma tribe inherit ectrodactyly, giving them the nickname of the "two-toed tribe". The island of Pingelap also suffered a population bottleneck in 1775 following a typhoon that had reduced the population to only 20 people. As a result, complete achromatopsia has a current rate of occurrence of roughly 10%, with an additional 30% being carriers of this recessive condition. Around 1814, a small group of British colonists founded a settlement on Tristan da Cunha, a group of small islands in the Atlantic Ocean, midway between Africa and South America. One of the early colonists apparently carried a rare, recessive allele for retinitis pigmentosa, a progressive form of blindness that afflicts homozygous individuals. As late as 1961, the majority of the genes in the gene pool on Tristan were still derived from 15 original ancestors; as a consequence of the inbreeding, of 232 people tested in 1961, four were suffering from retinitis pigmentosa.
{"page_id": 392309, "title": "Founder effect"}
improved with technical advances, and by 1933 the UK broadcasts using the Baird system were remarkably clear. A few systems ranging into the 200-line region also went on the air. Two of these were the 180-line system that Compagnie des Compteurs (CDC) installed in Paris in 1935 and the 180-line system that Peck Television Corp. started in 1935 at station VE9AK in Montreal. The advancement of all-electronic television (including image dissectors and other camera tubes and cathode-ray tubes for the reproducer) marked the start of the end for mechanical systems as the dominant form of television. Mechanical television, despite its inferior image quality and generally smaller picture, would remain the primary television technology until the 1930s. The last mechanical telecasts ended in 1939 at stations run by a lot of public universities in the United States. === Electronic === In 1897, English physicist J. J. Thomson was able, in his three well-known experiments, to deflect cathode rays, a fundamental function of the modern cathode-ray tube (CRT). The earliest version of the CRT was invented by the German physicist Ferdinand Braun in 1897 and is also known as the "Braun" tube. It was a cold-cathode diode, a modification of the Crookes tube, with a phosphor-coated screen. Braun was the first to conceive the use of a CRT as a display device. The Braun tube became the foundation of 20th century television. In 1906 the Germans Max Dieckmann and Gustav Glage produced raster images for the first time in a CRT. In 1907, Russian scientist Boris Rosing used a CRT in the receiving end of an experimental video signal to form a picture. He managed to display simple geometric shapes onto the screen. In 1908, Alan Archibald Campbell-Swinton, a fellow of the Royal Society (UK), published a letter in the scientific journal
{"page_id": 29831, "title": "Television"}
of text above to see if anything essential that needs to be revisited...though tempted to archive the lot.....Cas Liber (talk · contribs) 21:08, 23 September 2019 (UTC) I think fresh eyes need to take a look. It doesn't read well to me, but I might just be utterly fed up with the whole article. Lithopsian (talk) 19:18, 1 October 2019 (UTC) Okay, I think that is understandable. I'll put it up for Peer Review (see Wikipedia:Peer review/Rigel/archive1) and if one or two fresh sets of eyes have a look for readability and flow that is a start. Cas Liber (talk · contribs) 20:10, 1 October 2019 (UTC) Well I ended up making quite a few edits, but still a peer review would be helpful to assess the overall tone. Lithopsian (talk) 14:47, 2 October 2019 (UTC) Okay - well trying to get folks to look at this article has been like an echo chamber - no comments in a peer review or after mentioning it on discord chat. I am asking Mike Peel to take a look. After that, maybe we should just nominate at GAN as it seems to be about the only waystep we can get another set of eyes on it. Cas Liber (talk · contribs) 23:55, 24 January 2020 (UTC) Okay @Izno: I have reorganised the lead. I agree the nomenclature section is a bit heavy so far up the page - I am musing on moving para 3 of the nomenclature section to the stellar system section as it deals with the multiple components (??) - @Lithopsian, Attic Salt, and Praemonitus: - Izno has been the only person to comment despte me asking around alot and putting it up for peer review with zero feedback. I think it is within striking distance of GA-hood so
{"page_id": 68479436, "title": "Talk:Rigel/Archive 2"}
the employment of double images in astronomical measures is due to Servington Savery of Shilstone in 1743. Pierre Bouguer, in 1748, originated the true conception of measurement by double image without the auxiliary aid of a filar micrometer, that is by changing the distance between two object-glasses of equal focus. John Dollond, in 1754, combined Savary's idea of the divided object-glass with Bouguer's method of measurement, resulting in the construction of the first really practical heliometers. As far as we can ascertain, Joseph von Fraunhofer, some time not long before 1820, constructed the first heliometer with an achromatic divided object-glass, i.e. the first heliometer of the modern type. The first successful measurements of stellar parallax (to determine the distance to a star) were made by Friedrich Wilhelm Bessel in 1838 for the star 61 Cygni using a Fraunhofer heliometer. This was the 6.2-inch (157.5 mm) aperture Fraunhofer heliometer at Königsberg Observatory built by Joseph von Fraunhofer's firm, though he did not live to see it delivered to Bessel. Although the heliometer was difficult to use, it had certain advantages for Bessel including a wider field of view compared to other great refractors of the period, and overcame atmospheric turbulence in measurements compared to a filar micrometer. == Notes == == Further reading == Willach, Rolf. "The Heliometer: Instrument for Gauging Distances in Space." Journal of the Antique Telescope Society, number 26, pp. 5–16 (2004). == External links == Photos from the largest heliometer in the world (Kuffner-Observatory, Vienna)
{"page_id": 2192622, "title": "Heliometer"}
based on Red Hat Enterprise Linux 6.0 CloudLinux OS 7 is based on Red Hat Enterprise Linux 7.0 CloudLinux OS 8 is based on Red Hat Enterprise Linux 8.0 Crossbeam Systems COS - operating system for C-series of appliances XOS - operating system for X-series of appliances Egenera cBlade - Red Hat Enterprise Linux 2.1 Egenera BladeFrame OS 3.2 runs kernel 2.4.9−e.39 Egenera BladeFrame OS 4.0 runs kernel 2.4.9−e.43 Imperva SecureSphere Database Security Gateway MIRACLE LINUX Oracle Linux Trend Micro Interscan Messaging Security Virtual Appliance 7.0 is based on CentOS 5.0 (a re-compilation of Red Hat Enterprise Linux 5.0)[5] VMware ESXi is VMware's enterprise-class hypervisor. ESX, the older larger-footprint version, consisted of two parts: the VMkernel, a proprietary hypervisor kernel, and the Service Console, a Linux-based management interface. The Service Console was based on following Red Hat products: ESX Server 2.x Service Console is based on Red Hat Linux 7.2. ESX Server 3.0 Service Console is based on Red Hat Enterprise Linux 3.0 Update 6. [6] ESX Server 3.5 Service Console is based on Red Hat Enterprise Linux 3.0 Update 8. [7] ESX Server 4.0 Service Console is "compatible with" Red Hat Enterprise Linux 5.2. [8] == See also == Red Hat Enterprise Linux derivatives List of Linux distributions
{"page_id": 6428799, "title": "List of commercial products based on Red Hat Enterprise Linux"}
was the first wife of J. P. Morgan, but died of tuberculosis soon after their wedding. His younger brother was William Church Osborn, who served as president of the Metropolitan Museum of Art, and married philanthropist and social reformer Alice Clinton Hoadley Dodge, a daughter of William E. Dodge Jr. === Education === From 1873 to 1877, Osborn studied at Princeton University, obtaining a B.A. in geology and archaeology, where he was mentored by paleontologist Edward Drinker Cope. Two years later, Osborn took a special course of study in anatomy in the College of Physicians and Surgeons and Bellevue Medical School of New York under Dr. William H. Welch, and subsequently studied embryology and comparative anatomy under Thomas Huxley at London, as well as Francis Maitland Balfour at Cambridge University, England. In 1880, Osborn obtained a doctorate in paleontology from Princeton, becoming a lecturer in biology and professor of comparative anatomy from the same university between 1883 and 1890. == Career == In 1891, Osborn was hired by Columbia University as a professor of zoology; simultaneously, he accepted a position at the American Museum of Natural History, New York, where he served as the curator of a newly formed Department of Vertebrate Paleontology. === Fossil hunting === As a curator, he assembled a remarkable team of fossil hunters and preparators, including William King Gregory, Roy Chapman Andrews, Barnum Brown, and Charles R. Knight. Long a member of the US Geological Survey, Osborn became its senior vertebrate paleontologist in 1924. He led many fossil-hunting expeditions into the American Southwest, starting with his first to Colorado and Wyoming in 1877. Osborn conducted research on Tyrannosaurus brains by cutting open fossilized braincases with a diamond saw. (Modern researchers use computed tomography scans and 3D reconstruction software to visualize the interior of dinosaur endocrania
{"page_id": 437891, "title": "Henry Fairfield Osborn"}
research on what it was like to be blind and received input from his nieces, which he used to help build the character of Caitlin. While writing the trilogy Sawyer also consulted a young adult librarian, as he wanted to "appeal to both the adult and YA markets with the WWW trilogy". He also tried to incorporate various different ethnicities in the work, as he noted that several science fiction works such as Star Wars and 2001 did not contain many or any non-Caucasian characters. == Reception == Critical reception for the WWW Trilogy has been predominantly positive and the series has received praise from outlets such as Publishers Weekly, SF Site, and SF Signal. Much of the praise centered on its characters and technology, and in their review of Wake, the SF Site commented that "Even with such a focus on technology and culture, Sawyer never loses sight of his individual characters." Criticisms of the work tended to stem around Sawyer's usage of the trilogy to champion several different causes, which some reviewers felt detracted from their enjoyment of the work and did not help fully flesh out the characters. === Awards === Aurora Award for Wake (2009, won) Hugo Award for Wake (2009, nominated) == References == == External links == Official website WWW Trilogy series listing at the Internet Speculative Fiction Database FlashForward Author Robert J. Sawyer on How George Lucas Pre-Empted His SciFi Series
{"page_id": 32457804, "title": "WWW Trilogy"}
JavaScript, DOM, MathML, SVG, XSLT and XPath. Firefox's standards support and growing popularity have been credited as one reason Internet Explorer 7 was to be released with improved standards support. Since Web standards are often in contradiction with Internet Explorer's behaviors, Firefox, like other browsers, has a quirks mode. This mode attempts to mimic Internet Explorer's quirks modes, which equates to using obsolete rendering standards dating back to Internet Explorer 5, or alternately newer peculiarities introduced in IE 6 or 7. However, it is not completely compatible. Because of the differing rendering, PC World notes that a minority of pages do not work in Firefox, however Internet Explorer 7's quirks mode does not either. CNET notes that Firefox does not support ActiveX controls by default, which can also cause webpages to be missing features or to not work at all in Firefox. Mozilla made the decision to not support ActiveX due to potential security vulnerabilities, its proprietary nature and its lack of cross-platform compatibility. There are methods of using ActiveX in Firefox such as via third-party plugins but they do not work in all versions of Firefox or on all platforms. Beginning on December 8, 2006, Firefox Nightly builds pass the Acid2 CSS standards compliance test, so all future releases of Firefox 3 would pass the test. Firefox also implements a proprietary protocol from Google called "safebrowsing", which is not an open standard. == Cross-platform support == Mozilla Firefox runs on certain platforms that coincide OS versions in use at the time of release. In 2004 version 1 supported older operating systems such as Windows 95 and Mac OS X 10.1, by 2008 version 3 required at least OS X 10.4 and even Windows 98 support ended. Various releases available on the primary distribution site can support the following operating
{"page_id": 1564592, "title": "List of Firefox features"}
and location for the following quality characteristics: Sand Quality Control 37-4.03A(4)(c) Department Acceptance Flush coat acceptance is based on fog seal acceptance and the following: 1. Visual inspection for uniform application of sand. 2. Sand acceptance is based on the Department’s sampling and testing for compliance with the requirements shown in the following table: 480 Quality characteristic Test method Requirement Gradation (% passing by weight) Sieve size: 3/8" 100 No. 4 93–100 No. 8 California Test 202 61–99 No. 16 X ± 13 No. 30 X ± 12 No. 50 X ± 9 No.100 1–15 No. 200 0–10 37-4.03B Material Sand Gradation Quality characteristic Test method Requirement Gradation (% passing by weight) Sieve size: 3/8" 100 No. 4 93 –100 No. 8 California Test 202 61–99 No. 16 X ± 13 No. 30 X ± 12 No. 50 X ± 9 No.100 1–15 No. 200 0–10 37-4.03C Construction SECTION 37 BITUMINOUS SEALS Sand Gradation Acceptance Criteria NOTE: "X" is the gradation that you propose to furnish for the specific sieve size. 37-4.03B(1) General Reserved 37-4.03B(2) Sand Sand must be free from deleterious coatings, clay balls, roots, bark, sticks, rags, and other extraneous material. Sand for a flush coat must comply with the gradations shown in the following table: NOTE: "X" is the gradation that you propose to furnish for the specific sieve size. Fine aggregate sizes must be distributed such that the difference between the total percentage passing the No. 16 and No. 30 sieves is from 10 to 40, and the difference between the percentage passing the No. 30 and No. 50 sieves is from 10 to 40. 37-4.03C(1) General During flush coat activities, close adjacent lanes to traffic. Do not track asphaltic emulsion on existing pavement surfaces. Apply sand immediately after applying asphaltic emulsions. Spread sand aggregate with
{"source": 1498, "title": "from dpo"}
event management: Toward a new conception of team leadership]( **Mossman, Daniel Michael** (1998) Instrumental advancements to improve sample throughput for aminopeptidase profiling Evidence for a peroxisome proliferator-activated receptor (PPAR)-mediated mechanism for conjugated linoleic acid (CLA) Adaptive algorithms for sequential linear and quadratic programming with interior-point methods and fuzzy heuristics Factors affecting survival and recruitment of unionid mussels in small midwestern streams Phrases, prelinguistic vocalizations, and hearing impairment Pseudofunctorial behavior of cousin complexes on formal schemes Epitaxial growth of gallium nitride/aluminum gallium nitride by a rotating disk MOCVD reactor Turbulent steam jets in enclosed structures: An application to nuclear reactor accident analysis Investigation of the roles of the conserved residues in human mitochondrial aldehyde dehydrogenase and the characterization of the mechanism of rat mitochondrial aldehyde dehydrogenase import Phase equilibria of polymer solutions using the chain-of-rotators equation of state Language death and morphological decay: The case of Haysville East Franconian Rational speculation, central bank intervention and the negative forward discount bias Organization of the firm's activities: A pragmatic research paradigm extension of transaction cost theory Paleogene biostratigraphy, biogeography, paleoclimates and molluscan paleontology of the Kamchatka Peninsula A second language acquisition approach to the analysis of Spanish composition textbooks Meanings and practices of literacy in urban settlement communities: Chicago's Hull House, 1890-1940 (Re)presenting interracial sexuality: Race, sex, and discursive strategies in Sui Sin Far and Onoto Watanna [Assessing insider and outsider views of the circumplex model constructs: A
{"source": 3879, "title": "from dpo"}
packet-based transport layers • emulates the signals on the nine wires of an RS-232 cable • based on the ETSI 07.10 standard (also used by GSM terminals), allows multiplexing (via L2CAP) several serial ports over a single transport • supports flow control on individual channels • has a reserved Protocol and Service Multiplexer (PSM) value used by L2CAP to identify RFCOMM traffic • no error control • enables legacy applications -- written to operate over serial cables -- to run without modification IK2555, Spring 2016Maguire Slide 466RFCOMM Frame Types Five frame types (the first 4 are control frames): SABM Start Asynchronous Balanced Mode (startup command) UA Unnumbered Acknowledgement (response when connected) DISC Disconnect (disconnect command) DM Disconnected Mode (response to a command when disconnected) UIH Unnumbered Information with Header check • each RFCOMM channel has a Data Link Connection Identifier (DLCI) • UIH frames with DLCI = 0 are used for control messages, while DLCI ≠ 0 are used data IK2555, Spring 2016Maguire Slide 467Telephony Control Signaling (TCS) Protocol IK2555, Spring 2016 Slide 468 Maguire TCS-AT Telephony control can be performed using the AT command set use the RFCOMM to send and receive control signaling based on the AT command set (for example to implement a dialer application) TCS-BIN (BIN stands for the binary encoding of information) Runs directly on top of L2CAP; supports normal telephony control functions such as placing and terminating a call, sensing ringing tones, accepting incoming calls, etc. TCS-BIN supports point-to-multipoint communications as well, for example, a cordless base station can pass the ringing signal of an incoming call to several cordless headsets associated with the base stationBluetooth Profiles • specifications for building interoperable applications • All profiles depend on the Generic Access Profile (GAP) -- defines the basic rules and conditions for connecting devices with
{"source": 5831, "title": "from dpo"}
J. H. Wilkerson & Son Brickworks was a historic abandoned brickworks and national historic district located at Milford, Kent County, Delaware. The district includes the sites of three contributing buildings and one contributing site at the brickworks that operated from 1912 to 1957. The sheds, machinery, kiln, and other structures which housed the machinery remain standing, others have deteriorated or collapsed. Last standing were the storage shed, the shed over the brick-making machine, and one of the drying sheds. All of the machinery was in place as were other pieces of equipment used in the brick-making process. The walls of the kiln remain standing, just as they would have been left after the fired bricks are removed. It was listed on the National Register of Historic Places in 1978. It is listed on the Delaware Cultural and Historic Resources GIS system as destroyed or demolished. == References == == External links == Historic American Engineering Record (HAER) No. DE-5, "J. H. Wilkerson & Sons Brick Works, Front Street (Road 409), Milford, Sussex County, DE", 35 photos, 3 measured drawings, 13 data pages Brick Making Machine website
{"page_id": 38339304, "title": "J. H. Wilkerson & Son Brickworks"}
Thymidine monophosphate (TMP), also known as thymidylic acid (conjugate base thymidylate), deoxythymidine monophosphate (dTMP), or deoxythymidylic acid (conjugate base deoxythymidylate), is a nucleotide that is used as a monomer in DNA. It is an ester of phosphoric acid with the nucleoside thymidine. dTMP consists of a phosphate group, the pentose sugar deoxyribose, and the nucleobase thymine. Unlike the other deoxyribonucleotides, thymidine monophosphate often does not contain the "deoxy" prefix in its name; nevertheless, its symbol often includes a "d" ("dTMP"). Dorland’s Illustrated Medical Dictionary provides an explanation of the nomenclature variation at its entry for thymidine. As a substituent, it is called by the prefix thymidylyl-. == See also == DNA Nucleoside Nucleotide Oligonucleotide RNA == References ==
{"page_id": 1728603, "title": "Thymidine monophosphate"}
may be involved in promoting allergic reactions possibly by attracting through chemotaxis these cells to nascent sites of allergy and/or through stimulating these cells to release granule-bound enzymes, reactive oxygen species, or other promoters of allergic reactions. 5-Oxo-ETE's activity on human cells involved in non-allergic inflammatory diseases viz., neutrophils and monocytes, as well as its ability to attract these cell types to the skin of humans suggest that 5-oxo-ETE may also be involved in the broad category of non-allergic inflammatory diseases including those involving host defense against pathogens. === Lung airway smooth muscle cells === 5-Oxo-ETE contracts smooth muscle and organ-cultured bronchi isolated from guinea pigs but relaxes bronchi isolated from human lung; the relaxation of human bronchi caused by 5-oxo-ETE may not involve its OXER1. These results suggest that 5-oxo-ETE is not directly involved in the bronchoconstriction) that occurs in eosinophil-based allergic asthma reactions in humans. === Cancer cells === 5-Oxo-ETE (or other 5-HETE family member) stimulates the growth and/or survival of human cell lines derived from cancers of the prostate, breast, lung, ovary, colon and pancreas These preclinical studies suggest that 5-oxo-ETE (or other 5-HETE family member) may contribute to the cited cancers progression in humans. === Steroidogenic cells === 5-oxo-ETE stimulates human H295R adrenocortical cells to increase transcription of steroidogenic acute regulatory protein messenger RNA and produce aldosterone and progesterone by an apparent OXER1-dependent pathway. === Other cell types === 5-Oxo-ETE induces an isotonic volume reduction in guinea pig intestinal crypt epithelial cells. == Interaction with other stimuli == 5-Oxo-ETE and another potential mediator of human allergic reactions, platelet-activating factor, act in synergy to stimulate human eosinophils and neutrophils: the combined agents elicit responses that are greater than the simple sum of their individual actions and do so at relatively low. 5-Oxo-ETE also greatly increases the potencies
{"page_id": 47891463, "title": "5-Oxo-eicosatetraenoic acid"}
The Moroccan Meseta or Western Meseta is an uplifted terrane of dominantly Palaeozoic rocks exposed along the Moroccan coastal block between the Atlantic Margin and the Middle Atlas. == Geology == The Meseta Domain, taking its name from Spain's Meseta Central inner plateau, is an area of stable Paleozoic rock that was never affected by the Hercynian orogeny and was later covered by Mesozoic and Cenozoic sedimentary rocks. Forming Morocco's Central Massif, the Meseta Domain completely conceals Precambrian rocks, although boreholes have found Neoproterozoic rocks in a Meseta anticline. The domain is split in two by the Middle Atlas fold belt. The Western Meseta has relatively little sedimentary cover and well-developed massifs, while the Eastern Meseta spanning the border with Algeria has numerous, small Paleozoic massifs. Continuing from the Neoproterozoic until the Middle Devonian, western Morocco and the Anti-Atlas had the same depositional environment—molasse redbed deposition and post-orogeny volcanism. Southern Morocco was flooded by a massive shallow marine shelf, building up significant carbonates, mixed with continental sediments pouring in from inland areas now in the Sahara. In the Late Devonian, western Morocco and the Anti-Atlas split up into fault-bounded basins, which deformed during the Hercynian orogeny. == Flora and fauna == == References ==
{"page_id": 6827920, "title": "Moroccan Meseta"}
electric and magnetic fields with no moving parts, using magnetohydrodynamics. The working principle involves electrification of the propellant (gas or water) which can then be directed by a magnetic field, pushing the vehicle in the opposite direction. Although some working prototypes exist, MHD drives remain impractical. The first prototype of this kind of propulsion was built and tested in 1965 by Steward Way, a professor of mechanical engineering at the University of California, Santa Barbara. Way, on leave from his job at Westinghouse Electric, assigned his senior-year undergraduate students to develop a submarine with this new propulsion system. In the early 1990s, a foundation in Japan (Ship & Ocean Foundation (Minato-ku, Tokyo)) built an experimental boat, the Yamato-1, which used a magnetohydrodynamic drive incorporating a superconductor cooled by liquid helium, and could travel at 15 km/h. MHD power generation fueled by potassium-seeded coal combustion gas showed potential for more efficient energy conversion (the absence of solid moving parts allows operation at higher temperatures), but failed due to cost-prohibitive technical difficulties. One major engineering problem was the failure of the wall of the primary-coal combustion chamber due to abrasion. In microfluidics, MHD is studied as a fluid pump for producing a continuous, nonpulsating flow in a complex microchannel design. MHD can be implemented in the continuous casting process of metals to suppress instabilities and control the flow. Industrial MHD problems can be modeled using the open-source software EOF-Library. Two simulation examples are 3D MHD with a free surface for electromagnetic levitation melting, and liquid metal stirring by rotating permanent magnets. === Magnetic drug targeting === An important task in cancer research is developing more precise methods for delivery of medicine to affected areas. One method involves the binding of medicine to biologically compatible magnetic particles (such as ferrofluids), which are guided
{"page_id": 40310, "title": "Magnetohydrodynamics"}
Zyklon B (German: [tsyˈkloːn ˈbeː] ; translated Cyclone B) was the trade name of a cyanide-based pesticide invented in Germany in the early 1920s. It consists of hydrogen cyanide (prussic acid), as well as a cautionary eye irritant and one of several adsorbents such as diatomaceous earth. The product is notorious for its use by Nazi Germany during the Holocaust to murder approximately 1.1 million people in gas chambers installed at Auschwitz-Birkenau, Majdanek, and other extermination camps. Hydrogen cyanide, a poisonous gas that interferes with cellular respiration, was first used as a pesticide in California in the 1880s. Research at Degesch of Germany led to the development of Zyklon (later known as Zyklon A), a pesticide that released hydrogen cyanide upon exposure to water and heat. It was banned after World War I, when Germany used a similar product as a chemical weapon. Degussa purchased Degesch in 1922. Their team of chemists, which included Walter Heerdt and Bruno Tesch, devised a method of packaging hydrogen cyanide in sealed canisters along with a cautionary eye irritant and one of several adsorbents such as diatomaceous earth. The new product was also named Zyklon, but it became known as Zyklon B to distinguish it from the earlier version. Uses included delousing clothing and fumigating ships, warehouses, and trains. The Nazis started using Zyklon B in extermination camps in early 1942 to murder prisoners during the Holocaust. Tesch and his deputy executive, Karl Weinbacher, were executed in 1946 for knowingly selling the product to the SS for use on humans. Hydrogen cyanide is now rarely used as a pesticide but still has industrial applications. Firms in several countries continue to produce Zyklon B under alternative brand names, including Detia-Degesch, the successor to Degesch, who renamed the product Cyanosil in 1974. == Mode of action
{"page_id": 71305, "title": "Zyklon B"}
In mathematics, complementary series representations of a reductive real or p-adic Lie groups are certain irreducible unitary representations that are not tempered and do not appear in the decomposition of the regular representation into irreducible representations. They are rather mysterious: they do not turn up very often, and seem to exist by accident. They were sometimes overlooked, in fact, in some earlier claims to have classified the irreducible unitary representations of certain groups. Several conjectures in mathematics, such as the Selberg conjecture, are equivalent to saying that certain representations are not complementary. For examples see the representation theory of SL2(R). Elias M. Stein (1972) constructed some families of them for higher rank groups using analytic continuation, sometimes called the Stein complementary series. == References == A.I. Shtern (2001) [1994], "Complementary series (of representations)", Encyclopedia of Mathematics, EMS Press Stein, Elias M. (April 1970), "Analytic Continuation of Group Representations", Advances in Mathematics, 4 (2): 172–207, doi:10.1016/0001-8708(70)90022-8, also reprinted as ISBN 0-300-01428-7
{"page_id": 11118957, "title": "Complementary series representation"}
83(6): 2191-2229 [CFP 1502] "Collateral Equilibrium: I: A Basic Framework" (with William R. Zame), Economic Theory (August 2014), 56(3): 443-492 [CFP 1431] "Endogenous Collateral Constraints and the Leverage Cycle" (with Ana Fostel), Annual Review of Economics (May 2014) [CFP 1430] "Leverage, Default, and Forgiveness: Lessons of the American and European Crises," Journal of Macroeconomics (March 2014), 39(Part B): 313-333 [CFP 1419] "Monitoring Leverage" (with Lasse H. Pedersen), in Markus K. Brunnermeier and Arvind Krishnamurthy, eds., Risk Topography: Systemic Risk and Macro Modeling, NBER, 2014, pp. 175–182 CFDP 1838, CFP 1432 "Afriat from MinMax," Economic Theory (November 2013), 54(3): 443–448. "Asymptotic Behavior of a Stochastic Discount Rate" (with W. Sudderth, O. Zeitouni) (November 2011), forthcoming, Sankhya: The Indian Journal of Statistics (September 2013) Advance online publication doi:10.1007/s13171-013-0037-9 "Prizes vs. Wages with Envy and Pride," Japanese Economic Review (March 2013), 64(1): 98–121 "Getting at Systemic Risk via an Agent-Based Model of the Housing Market" (with Robert Axtell, Doyne J. Farmer, Peter Howitt, Benjamin Conlee, Jonathan Goldstein, Matthew Hendrey, Nathan M. Palmer, Chun-Yi Yang), American Economic Review: Papers & Proceedings (May 2012), 102(3): 53–58 [CFP 1358] "Leverage Causes Fat Tails and Clustered Volatility," Quantitative Finance (May 2012), 12:5: 695-707 (with Stefan Thurner, J. Doyne Farmer) [CFP 1371] "Tranching, CDS, and Asset Prices: How Financial Innovation Can Cause Bubbles and Crashes" (with A. Fostel), American Economic Journal: Macroeconomics (January 2012), 4(1): 190-225 [CFP 1353] "Why Does Bad News Increase Volatility and Decrease Leverage" (with A. Fostel), Journal of Economic Theory (March 2012), 147(2): 501-525 [CFP 1354] "Incorporating Financial Features into Macroeconomics: Discussion," in Macroeconomic Challenges: The Decade Ahead. Jackson Hole, Federal Reserve Bank of Kansas City Economic Policy Symposium, 2011 [CFP 1331] "Markets and Contracts," Journal of Mathematical Economics (May 2011), 47(3): 279-288 (with A. Bisin, P. Gottardi, E. Minelli, H. Polemarchakis) [CFP 1342]
{"page_id": 31345918, "title": "John Geanakoplos"}
in size within a single dike, but range from a few centimeters to over 0.3 meters across in different dikes, tending to be thicker in wider dikes. Larger columns are likely a consequence of slower cooling. Dike rock is usually dense, with almost no vesicles (frozen bubbles), but vesicles may be seen in the shallowest part of a dike. When vesicles are present, they tend to form bands parallel to walls and are elongated in direction of flow. Likewise, phenocrysts (larger crystals) on the margins of the dike show an alignment in the direction of flow. In contrast to dikes, which cut across the bedding of layered rock, a sill is a sheet intrusion that forms within and parallel to the bedding. === Formation === Mafic magma (fluid magma low in silica) usually reaches the surface through fissures, forming dikes. At the shallowest depths, dikes form when magma rises into an existing fissure. In the young, shallow dikes of the Hawaiian Islands, there is no indication of forceful intrusion of magma. For example, there is little penetration of magma into the walls of dikes even when the walls consist of highly porous volcanic clinker, and little wall material breaks off into the molten magma. These fissures likely open as a result of bulging of the rock beds above a magma chamber that is being filled with magma from deeper in the crust. However, open fractures can exist only near the surface. Magma deeper in the crust must force its way through the rock, always opening a path along a plane normal to the minimum principal stress. This is the direction in which the crust is under the weakest compression and so requires the least work to fracture. At shallow depths, where the rock is brittle, the pressurized magma progressively fractures
{"page_id": 975686, "title": "Dike (geology)"}
Microvias are used as the interconnects between layers in high density interconnect (HDI) substrates and printed circuit boards (PCBs) to accommodate the high input/output (I/O) density of advanced packages. Microvias are relevant in electronics manufacturing. Driven by portability and wireless communications, the electronics industry strives to produce affordable, light, and reliable products with increased functionality. At the electronic component level, this translates to components with increased I/Os with smaller footprint areas (e.g. flip-chip packages, chip-scale packages, and direct chip attachments), and on the printed circuit board and package substrate level, to the use of high density interconnects (HDIs) (e.g. finer lines and spaces, and smaller vias). == Overview == IPC standards revised the definition of a microvia in 2013 to a hole with depth to diameter aspect ratio of 1:1 or less, and the hole depth not to exceed 0.25mm. Previously, microvia was any hole less than or equal to 0.15mm in diameter With the advent of smartphones and other hand-held electronic devices, microvias have evolved from single-level to stacked microvias that cross over multiple HDI layers. Sequential build-up (SBU) technology is used to fabricate HDI boards. The HDI layers are usually built up from a traditionally manufactured double-sided core board or multilayer PCB. The HDI layers are built on both sides of the traditional PCB one by one with microvias. The SBU process consists of several steps: layer lamination, via formation, via metallization, and via filling. There are multiple choices of materials and/or technologies for each step. Microvias can be filled with different materials and processes: Filled with epoxy resin (b-stage) during a sequential lamination process step Filled with non-conductive or conductive material other than copper as a separate processing step Plated closed with electroplated copper Screen printed closed with a copper paste Buried microvias are required to be
{"page_id": 19888524, "title": "Microvia"}
scope and content of the course by the enrolling UC campus. This usually occurs after transfer and may require recommendations from faculty. Information about internships may also be pre - sented for review, but credit for internships rarely transfers to UC. 921 Cooperative Education - Theater (2) CSU RPT7 Note: Requires 15 to 19 hours per week; paid employment related to the occupational major and enrollment in at least 7 units (which include Co-op Ed). Cooperative Education is a work experience program involving the employer, the student-employee and the college to ensure that the student receives on the job training and the unit credit for work experience or volun - teer work/internship. Students must be employed or vol - unteering/interning in order to participate in program. During the fall and spring semesters, students shall be enrolled in at least one additional course in a U.S. region - ally accredited institution. This course assists students in acquiring desirable work habits, attitudes, and career awareness in the field of Theatre. Career and Continuing Education Department 404 EAST LOS ANGELES COLLEGE | GENERAL CATALOG | 2023-2024 # Career and Continuing # Education Department E3-100 • (323) 260-8174 Noncredit courses provide individuals with competen - cies that are critical to their ability to prepare and suc - ceed in college and the workplace. These free courses are designed to help persons of all ages learn English, prepare for the High School Equivalency Examination (GED/HiSET), obtain short-term job training, transition to college credit courses, and prepare for US Citizenship. # Faculty Villacorte, Dennis A. , Chair, Professor, Noncredit Basic Skills Barajas, Leticia , Associate Professor, Noncredit, Vocational Education Renderos, Kenny , Assistant Professor, Noncredit Vocational Education Schilling, Tova , Assistant Professor, Noncredit ESL # Adjunct Associate Professors Alvarado, Joaquin Arroyo, Elizabeth Bernhard, Gregory S. Bustamante,
{"source": 957, "title": "from dpo"}
raised. Unfortunately the cache-loading done by that read still happens, and the hot cache is easily detectable by having the attacker time its own reads of the possible locations. (With more than two locations, you can exfiltrate more than one bit at once, possibly much more.) Needless to say, if you have a way to exfiltrate the data other than a shared memory region, you can use it: the basic attack (relying on side-effects of speculations bound to fail) is the same. ### Notes from the Intelpocalypse Posted Jan 4, 2018 23:15 UTC (Thu) by **samiam95124** (guest, #120873) [Link Its not that speculative exec "ignores memory protection", but that you can't cause exceptions based on what might not even happen. Go down that road and you would be causing faults everywhere. The key to speculative execution is that it has to cause no side effects that would not be there if the processor didn't speculatively execute at all. Obviously there is one the CPU designers didn't think of, which is access time. That's what makes this exploit a really, really clever one. ### Notes from the Intelpocalypse Posted Jan 5, 2018 6:52 UTC (Fri) by **epa** (subscriber, #39769) [Link Sure, it can't cause a memory exception based on something that might not happen -- but ideally it shouldn't speculate accesses to memory which isn't accessible. Currently, I think it is fair to say that speculative execution 'ignores' the memory protection, in this example at least. The accessibility of the memory doesn't have any impact on what speculative execution does. I suggest that if practical, speculative execution should take memory protection into account, and if it gets to the point where an exception would be triggered, just stop speculating at that point and don't actually fetch the
{"source": 2308, "title": "from dpo"}
needed through - out the project life cycle. Table J-1 provides some high level guidance on the scope of SEMP con - tent based on the life cycle phase. • Project requirements that have been tailored or significant customization of SE processes should be described in the SEMP. • For multi-level projects, the SEMP should be consis - tent with higher-level SEMPs and the project plan. • For a technical effort that is contracted, the SEMP should include details on developing requirements for source selection, monitoring performance, and transferring and integrating externally produced products to NASA. # J.2 Terms Used Terms used in the SEMP should have the same mean - ing as the terms used in the NPR 7123.1, Systems Engineering Processes and Requirements. 225 NASA SYSTEMS ENGINEERING HANDBOOK Appendix J: SEMP Content Outline # J.3 Annotated Outline Title Page Systems Engineering Management Plan (Provide a title for the candidate program/project and designate a short title or proposed acronym in parenthesis, if appropriate.) . . . > Designated Governing Authority/Technical Authority Date > Program/Project Manager Date > Chief Engineer Date > Date > Date By signing this document, signatories are certifying that the content herein is acceptable as direction for engineering and technical management of this program/project and that they will ensure its implementation by those over whom they have authority. 226 NASA SYSTEMS ENGINEERING HANDBOOK > Appendix J: SEMP Content Outline 1.0 Purpose and Scope This section provides a brief description of the purpose, scope, and content of the SEMP. • Purpose: This section should highlight the intent of the SEMP to provide the basis for implementing and communicating the technical effort. • Scope: The scope describes the work that encompasses the SE technical effort required to generate the work products. The plan is used by the technical
{"source": 4933, "title": "from dpo"}
3.7.1 Mathematical Object Classes LATEX decides how much space to surround the symbols in math mode based on their class . For example, ≤ belongs to class of binary relations, 114 Typesetting Mathematical Formulae Table 3.4: Commands to influence mathematical object classes Command Explanation Examples \mathord Ordinary symbols, that do not require any special han-dling x 𝑥 \bot ⊥ \mathop Large operators, that are vertically centred within ex-pression \sum ∑ \bigcap ⋂ \mathbin Binary operators, with ex-tra spacing around them + + \times × \mathrel Binary relations, with extra spacing around them = = \succeq ⪰ \mathopen Symbols that open groups, with space before ( ( \lBrack ⟦ \mathclose Symbols that close groups, with space after ) ) \rBrack ⟧ \mathpunct Punctuation symbols, with space after , , \colon ∶ so it is typeset with surrounding spaces. The class of a symbol can be changed using the commands listed in Table 3.4. For example, the symbol 𝑅 is normally treated as alphabetical character, but we may force it to treat it as relation symbol using the \mathrel command. > Let \(R\) be any relation. We should now write it like this \(a \mathrel{R} b\), and not like this \(a R b\). Let 𝑅 be any relation. We should now write it like this 𝑎 𝑅 𝑏 , and not like this 𝑎𝑅𝑏 . It is important to use symbols with proper classes while typesetting mathematics. Some symbols may look the same as a single glyph but are different in terms of their classes. For example, \bot and \perp look very similar, but the former is meant to typeset a symbol, while the latter represents the relation of perpendicularity. > Let \(x \in \{\top, \bot\}\). Given two lines \(k \perp l\). Let 𝑥 ∈ {⊤, ⊥} .Given two lines 𝑘 ⟂
{"source": 6153, "title": "from dpo"}
In applications it is difficult to have access to the real value of η {\displaystyle \eta } , but we assume we have access to its upperbound η B {\displaystyle \eta _{B}} . Note that if we allow the noise rate to be 1 / 2 {\displaystyle 1/2} , then learning becomes impossible in any amount of computation time, because every label conveys no information about the target function. Definition: We say that f {\displaystyle f} is efficiently learnable using H {\displaystyle {\mathcal {H}}} in the classification noise model if there exists a learning algorithm A {\displaystyle {\mathcal {A}}} that has access to Oracle ( x , η ) {\displaystyle {\text{Oracle}}(x,\eta )} and a polynomial p ( ⋅ , ⋅ , ⋅ , ⋅ ) {\displaystyle p(\cdot ,\cdot ,\cdot ,\cdot )} such that for any 0 ≤ η ≤ 1 2 {\displaystyle 0\leq \eta \leq {\frac {1}{2}}} , 0 ≤ ε ≤ 1 {\displaystyle 0\leq \varepsilon \leq 1} and 0 ≤ δ ≤ 1 {\displaystyle 0\leq \delta \leq 1} it outputs, in a number of calls to the oracle bounded by p ( 1 1 − 2 η B , 1 ε , 1 δ , n , s i z e ( f ) ) {\displaystyle p\left({\frac {1}{1-2\eta _{B}}},{\frac {1}{\varepsilon }},{\frac {1}{\delta }},n,size(f)\right)} , a function h ∈ H {\displaystyle h\in {\mathcal {H}}} that satisfies with probability at least 1 − δ {\displaystyle 1-\delta } the condition e r r o r ( h ) ≤ ε {\displaystyle error(h)\leq \varepsilon } . == Statistical query learning == Statistical Query Learning is a kind of active learning problem in which the learning algorithm A {\displaystyle {\mathcal {A}}} can decide if to request information about the likelihood P f ( x ) {\displaystyle P_{f(x)}} that a function f {\displaystyle f} correctly
{"page_id": 48833041, "title": "Error tolerance (PAC learning)"}
Richard Tenguerian (Armenian: Տիգրան Թընկըրեան; born, August 3, 1955) is an architectural model maker of Armenian descent. Some of his notable physical models include the Kingdom Center in Riyadh (1998), Yankee Stadium in New York (2006), The Sail @ Marina Bay in Singapore (2007), and Comcast Center in Philadelphia (2008). More recently, he has made architectural models for the New Tappan Zee Bridge in New York (2013), CBS Sixty Minutes, and the Hudson Yards Redevelopment Project in New York (2014). He is the founding principal of Tenguerian Models and resides in New York City. == Early life == Richard Tenguerian was born in Aleppo, Syria. His parents are survivors of the Armenian genocide . His father, Antranig Tenguerian, was a sculptor and his mother, Mary Tenguerian, was a fashion designer who worked for Chanel Studio in Lebanon . At age 14, while attending school, Richard entered a summer internship program with one of Lebanon's leading architectural firms, where he made his first model. He applied to the American University in Beirut, but the 1975 Lebanese Civil War thwarted his intentions. == Career == At age 21, Richard visited a relative in New York and was intrigued by the opportunities the city offered. He began working as a model maker, and built a reputation in the architectural community, which helped him finance his undergraduate education. He earned a bachelor's degree in architecture from the Pratt Institute. Encouraged by the high demand for model makers in the architectural community, Richard started his own company, becoming a pioneer in the field. Early on in his career, he was contacted by the legendary architect Philip Johnson, who sought his services, thus paving his way to greater accomplishments . In addition to various projects in the United States, he has created models for buildings in
{"page_id": 42565517, "title": "Richard Tenguerian"}
Maize miller is the processing of maize (corn) for safe and palatable consumption as food. Processing can be by machine-milling in either large- or small-scale mills, or by hand-milling in domestic or community settings. The maize is first cleaned and then "conditioned", or "tempered", by soaking the kernels in water. This facilitates the separation of the seed coat and pericarp from the endosperm. Further processing consists of separating components of the grain, and grinding it into various grades. == Cleaning and conditioning == Cleaning and conditioning of the maize is an important step in the process and refers to the removal of foreign material and all that is not maize kernels from the to-be milled grain that lowers the quality of the product such as husk, straw, dust, sand, and everything too big or too small and lighter than a maize kernel. It also refers to the removal of poisonous seeds, and material harmful to the milling equipment such as metal and stones. Conditioning refers to the addition of moisture to the maize to allow the bran to be peeled off in flakes during milling with plate or roller mills, allowing easy separation in a sifter and, most importantly, to add mass to the meal. == Milling and sifting == Following this process, milling can commence and may take several forms: The roller mill may be a single roller mill, double roller mill or pneumatic roller mill. In a complete maize milling plant, there are several roller mills that work together, they have different functions, the first mill mainly peeling the maize skin, the second and third will grind the maize into granular sizes, and meanwhile to get some super fine flour, and the granular sized product will go to the next mill to continue grinding. While grinding time, use
{"page_id": 28043082, "title": "Maize milling"}
email (information encountered) and flag (an act of keeping) as "high priority" or "read later" depending upon the message's assessed importance. Meta-level activities focus more broadly on aspects of the mapping itself. Activities to maintain and organize focus on personal information collections such as a person's inbox, photo collection, or the digital documents in a personal file system. Included are efforts to delete or archive information that is out-of-date or no longer used, efforts to update file formats, and efforts to create backups of information to secure against loss. Also included are efforts to create an organizing structure in support of keeping and re-finding. Activities to manage privacy and the flow of information include, for example, decisions concerning privacy settings in a social media application such as Facebook and efforts to manage email subscriptions and efforts to filter incoming email (e.g., by marking some as "junk" or "spam"). Activities to measure and evaluate include efforts to assess the time effectiveness of a practice of PIM e.g., "Am I spending too much time in email?"; "Is this folder structure worth the trouble it takes to maintain?" Activities to make sense of and use information focus on the decisions to make and the actions to take for a collection of information, once gathered. For example, among the choices available in new automobiles (new laptops, new employees, etc.), which will best meet a person's needs? Or what is the overall picture of health that emerges from all the data kept by a fitness tracker? PIM activities overlap with one another. For example, the effort to keep an email attachment as a document in a personal file system may prompt an activity to organize the file system e.g., by creating a new folder for the document. Similarly, activities to organize may be prompted by
{"page_id": 283329, "title": "Personal information management"}
The effects of early-life exposures to anesthesia on the brain in humans are controversial. Evidence from nonhuman primate research suggests significant developmental neurotoxicity and long-term social impairment, with a dose–response relationship where repeated exposures cause a more severe impact than single ones. Research in humans has not found conclusive clinical evidence of cognitive impairment; however, systematic reviews imply the possibility of greater behavioural impairments in children exposed to anesthesia before the age of three than control subjects. Debate exists over the real-world consequences of these impacts. The effect size of early-life anesthesia exposure appears small, and may or may not be practically relevant. In 2016, the United States Food and Drug Administration issued a communication cautioning about "repeated or lengthy" exposure to general anesthetic prior to age three and suggested clinicians and caregivers weigh the risks and benefits of surgical procedures longer than three hours in this population. == Preclinical evidence == Studies in preclinical models have demonstrated that rodents and nonhuman primates that were exposed to general anesthesia in infancy developed neurodevelopmental problems later in life. Particularly in nonhuman primates, studies of exposures to anesthesia in infancy indicate that early-life anesthesia is associated with long-term changes in social behaviors, elevated anxiety and/or inhibition. At the cellular level, the exposure of rodents and nonhuman primates to anesthesia during infancy causes developmental neurotoxicity, including widespread neuronal and glial apoptosis, and deficits in synapse and mitochondria structures and functions. Exposures to anesthetics in early life can also cause genomic and epigenomic changes, including reduced levels of proteins that regulate the development and function of neurons, such as BDNF and immediate early genes. Multiple exposures to anesthesia have been found to confer greater deficits in neurotoxicity, cognition and social behavior than single exposures. Nearly all anesthetics that are antagonists of NMDA receptors and/or
{"page_id": 68731789, "title": "Effects of early-life exposures to anesthesia on the brain"}
scales. Additionally, the shoreline development index cannot be compared for lakes with different surface areas because large lakes automatically have higher values than smaller lakes, even if they have the same planform shape. Hence the shoreline development index can only be used to compare lakes with the same surface area that are also mapped at the same scale. Making comparisons like this can create spurious correlations between the shoreline development index and ecological variables. == References ==
{"page_id": 66143322, "title": "Shoreline development index"}
footwall – is landward of the fault plane and the downthrown block – the hanging wall – is basinward of the fault plane. Most deformations occur within the hanging wall side. The downthrown block slips downward and basinward relative to the upthrown block. This is caused due to the differential load of the overlying sediments and the high mobility of the lowermost low density layer. As a result, the sedimentary layers collapse forming synthetic and antithetic dip-slip faults that dip in the same direction or in the opposite direction of the main growth fault respectively or bend forming rollover anticlines close to the fault plane. Those structures are usually formed simultaneously and are thought to be created as a result of sediments filling the gap that is formed hypothetically by the basinward movement of the downthrown block. == Driving force == The main driving forces of the growth faults are the deferential sediments load and the low density layers - evaporites or over-pressured shale - that are formed during or right after the rifting process. Growth faults are located mainly within passive margin sedimentary wedges where tectonic forces have minimum or no effect. These passive margins receive millions of tons of sediments every year which are concentrated on the continental shelf below base level and above areas where the water velocity is no longer supporting the particles weight. This zone is called depositional center (depocenter for short) and has higher sediments load. Evaporites and/or high-pressured shale layers have the ability to flow because of their high mobility and low viscosity characteristics. Rift zones are partially restricted and have limited access to open oceans during rifting period. they are affected by sea level changes and climatic variability. Thick layers of evaporites are formed due to continuous water evaporation and fill of
{"page_id": 40755359, "title": "Growth fault"}
female in her decision-making process === Mice === DDK is a lethal phenotype in Mus Domesticus (house mice) that leads to developmental abnormalities and eventually deterioration of the embryo when females with the phenotype mate with males who carry other inbred strains. Scientists have discovered that expression of this incompatibility within the embryo depends on the paternal allele of the DDK syndrome. If the paternal allele is compatible, meaning the male is not carrying an inbred strain (ex. DDK female x non-DDK male), the embryo will survive. However if the male carries the incompatible allele, the embryo will not survive. == Sympatric color morphs == Genetic color polymorphisms are genetically defined color forms between animals of the same species. For the most part, color morphs within a population can interbreed without any issues. However, evidence shows that in certain cases, the viability of interbred color morph offspring is drastically lower than those that present the same color. While coloration is the most pronounced exhibition of a certain phenotype as individuals can be easily and quickly differentiated to the human eye, there are other factors that may be affected but not as easily identified. === Gouldian finches === A group of researchers investigated how the survival rates of offspring of Erythrura Gouldiae (Gouldian finch) are impacted when the mating pair have genes for different colors. They bred both pure and mixed pairs of the finches (in this species the gene for producing a red-headed finch is dominant to the one that produces a black headed finch). After incubation, eggs that were produced from mixed pairs were 34.3% less likely to hatch compared to those that were produced from pure pairs. The mixed-pair offspring that did survive the incubation stage were still at a disadvantage, being burdened with a 32.1% increase in
{"page_id": 70418409, "title": "Genetic incompatibility"}
16 Vulpeculae is a binary star system in the northern constellation Vulpecula. It has a combined apparent visual magnitude of 5.787, which is near the lower limit of visibility to the naked eye. Based upon an annual parallax shift of 14.71±0.50 as seen from Earth's orbit, it is located about 222 light years away. The system is moving closer to the Sun with a heliocentric radial velocity of about −37 km/s. It will make its closest approach in about 0.9 million years, coming within 155 light-years (47.42 pc). The pair orbit each other with an estimated period of 1,201 years and an orbital eccentricity of 0.932. The magnitude 5.93 primary, component A, displays a stellar classification of F2III, matching an aging F-type giant star. This star is spinning rapidly with a projected rotational velocity of 136 km/s. This is giving the star an oblate shape with an equatorial bulge that is an estimated 21% larger than the polar radius. It is 742 million years old with 1.34 times the mass of the Sun. The star is radiating 31 times the Sun's luminosity from its photosphere at an effective temperature of about 6,888 K. == References ==
{"page_id": 21960083, "title": "16 Vulpeculae"}
PokerGO is an over-the-top content platform based in Las Vegas, Nevada. PokerGO was launched in 2017 as a subscription-based streaming service, offering poker-centric online streaming. The content offered on PokerGO includes poker tournaments, along with cash game-orientated shows. As of February 2021, PokerGO's library of content includes over 2,400 videos totaling over 3,800 continuous hours. == Content == PokerGO includes shows, tournament replays, and cash games. Other media includes episodes, live-streams, and recap videos. Live-streamed events can be accessed as on-demand videos after. === Poker tournaments and cash games === ==== High Stakes Poker ==== High Stakes Poker is a cash game poker television program hosting a mix of professional and amateur poker players playing high stakes No-Limit Hold’em with buy-ins ranging from $100,000 to $500,000. The show debuted in January 2006 and initially ran for seven seasons till May 2011. In February 2020, PokerGO announced that they had acquired the High Stakes Poker brand and the show's assets. In December 2020, a new season of High Stakes Poker aired on PokerGO and included returning players Tom Dwan, Phil Hellmuth, Brandon Adams, and Phil Ivey, while also introducing new players to High Stakes Poker including Jason Koon, Jean-Robert Bellande, Bryn Kenney, Doug Polk, Michael Schwimer, and Chamath Palihapitiya. There are nine seasons of High Stakes Poker and 126 episodes, and current hosts include Nick Schulman and A.J. Benza. ==== Poker After Dark ==== Poker After Dark is a poker television program that follows the development of one table of poker players over a period of time. The seasons are split into weeks with each given a theme based on the players involved. Poker After Dark originally began under a No-Limit Hold’em sit-n-go format before evolving to cash games that also featured different game variations such as Pot-Limit Omaha, 2-7 Triple
{"page_id": 65252533, "title": "PokerGO"}
will vary from transaction to transaction, but there is little doubt that producers of very small quantities stand little chance of becoming regular exporters if they cannot consolidate with others. It does not really make sense to ship a container for 25 or 50 bags. And the negative impact on the CO2 footprint needs to be considered. Air freight: If a small lot of expensive specialized coffee can bear the cost of paying freight for a full container, then it may sometimes be just as cost effective to use air freight instead. However, customs and security issues play a role here. Coffee is not normally exported or imported this way, so airlines and air freight companies do not always know how to handle the associated administrative procedures. Finally, yet another problem facing shippers of small lots of top-quality coffee is that quality can be compromised if transit times are too long due to, say, multiple transshipments. > Source :International Trade Centre. CHAPTER 7 – THE COMMERCIAL ASPECTS OF THE COFFEE TRADE 252 # Shipping in containers Bagged coffee in 20-foot ‘dry containers’ (and today even in 40-foot containers) is a major improvement over the old breakbulk method, but still involves extensive handling and does not fully exploit the carrying capacity of a container. This is important, as transport and freight costs are charged per container rather than by weight. The cost of handling bagged cargo is also escalating, especially in importing countries. When correctly lined with cardboard or sufficiently strong Kraft paper, and if properly stuffed, standard 20-foot dry containers are suitable for transporting bagged coffee. This does not mean that this type of container is suitable for prolonged coffee storage. At the same time, more and more coffee is being shipped in bulk. Experiments with bulk shipments began in
{"source": 1026, "title": "from dpo"}
a predefined set of splitting rules. A leaf contains a specific label. An example of a decision tree for the papayas example (described in Chapter 2) is given in the following: Color? not-tasty > other Softness? not-tasty > other tasty > gives slightly to palm pressure > pale green to pale yellow To check if a given papaya is tasty or not, the decision tree first examines the color of the Papaya. If this color is not in the range pale green to pale yellow, then the tree immediately predicts that the papaya is not tasty without additional tests. Otherwise, the tree turns to examine the softness of the papaya. If the softness level of the papaya is such that it gives slightly to palm pressure, the decision tree predicts that the papaya is tasty. Otherwise, the prediction is “not-tasty.” The preceding example underscores one of the main advantages of decision trees – the resulting classifier is very simple to understand and interpret. > Understanding Machine Learning, c©2014 by Shai Shalev-Shwartz and Shai Ben-David Published 2014 by Cambridge University Press. Personal use only. Not for distribution. Do not post. Please link to 18.1 Sample Complexity 251 ## 18.1 Sample Complexity A popular splitting rule at internal nodes of the tree is based on thresholding the value of a single feature. That is, we move to the right or left child of the node on the basis of 1[xi<θ ], where i ∈ [d] is the index of the relevant feature and θ ∈ R is the threshold. In such cases, we can think of a decision tree as a splitting of the instance space, X = Rd, into cells, where each leaf of the tree corresponds to one cell. It follows that a tree with k leaves can shatter
{"source": 3334, "title": "from dpo"}
and τ ′ agree on the first j messages. 54 LECTURE 14. REDUCTIONS CS 85, Fall 2009, Dartmouth College Data Stream Algorithms Case 1 : j is odd = 2 k − 1 (k ≥ 1) (say). So, we have: α′ > 1 = α1, α ′ > 2 = α2, . . . , α ′ > k−1 = αk−1, α ′ > k = αk and β′ > 1 = β1, β ′ > 2 = β2, . . . , β ′ > k−1 = βk−1, β ′ > k =?. Now, β′ > k depends on Bob’s input which does not change between (x1, y1) and (x2, y1), and it depends on the transcript so far which also does not change. So, β′ > k = βk . Case 2 : j is even = 2 k (k ≥ 1) (say). The proof for this case is similar to that of case 1, except we consider inputs (x2, y2) and (x2, y1).By induction, we have the rectangle property. Now that we have the rectangle property at hand, we can proceed to prove: Theorem 14.0.4. D(EQ) ≥ n. Proof : Let P be a deterministic communication protocol solving EQ. We will prove that P has at least 2 n different transcripts which will imply that P sends ≥ n bits. Suppose trans p(x1, x1) = trans p(x2, x2) = τ , where x1 6 = x2.Then, by rectangle property: trans p(x1, x2) = τ ⇒ output on (x1, x1) = output on (x1, x2) ⇒ 1 = EQ (x1, x1) = EQ (x1, x2) = 0. [Contradiction] This means that the 2 n possible inputs lead to 2 n distinct transcripts. Note : General communication corresponds to multi-pass streaming. Theorem 14.0.5. Any deterministic streaming algorithm for DISTINCT-ELEMENTS,
{"source": 5222, "title": "from dpo"}
arboricity, 74-76 Mine, 24, 63 Ramanujan, 145 Rival and Sands, 93 Simonovits and Sos, 271 Szele, 16,63 Convex body, 31, 110-112, 237, 241, 244, 252 Covariance, 44, 46 Covering, 56 number, 56 of a graph, 74 of a hypergraph, 56-57, 60 ofK d , 73-74 decomposable, 73 non decomposable, 73 Crossing number, 285-286 Cut, 6 Cycle, 41 Density of a graph, 50, 52 of a set, 325 of linear expanders, 143 ofK dpacking, 253 Dependency, 126 digraph, 68-69, 72, 75, 77-78, 133 graph, 72, 80 superdependeney digraph, 134 Deviation large, 45, 99, 127, 129, 131, 134, 307, 313 inequality, 99 standard, 4 3 ^ 4 , 77, 117, 134, 223, 243 Discrepancy, xiii, 221-222, 231, 248, 250-251,264 of a set, 222 hereditary, 226-228 linear, 226-227 Disjoint diques, 101 family, 73, 127 maximal, 127 pairs, 10 pairwise, 9, 13, 75, 82 Distribution, 4, 17, 21, 47, 91, 98-100, 114, 162, 167, 183 binomial, 37-38, 77, 117, 210, 242, 257, 309,314 normal, 21, 44, 4 6 ^ 7 , 107, 231, 309, 311, 313,316,318-319,324 Poisson, 37-38, 119, 128, 130, 133, 182, 313-314 uniform,9, 61,71,75-76,78, 83, 110, 147, 217,237,239,241,249 Dominant component, 181 Dominating set, 4-6, 175 Ecological limitation, 188, 190, 193 Edge connectivity, 6, 92 Ehrenfeucht game, 168 Eigenvalue, 143 of a graph, 149 of a matrix, 145 of a regular graph, 144-145, 147-148 of a symmetric matrix, 143-144, 146-147, 149 Eigenvector of a symmetric matrix, 144, 146-147 Entropy, 223-224, 226, 255, 266, 268, 272 binary, 266 conditional, 266 function, 136,256,266 of a random variable, 266 e-net, 243-245 e-sample, 244-245, 248, 280 Euclidean distance, 111 norm, 19,23,61,229 space, 73, 238, 240, 244, 270 Expander, 143-145, 156 explicit construction, 143, 149 linear, 143 density, 143 Expectation, xiii, 18-19, 23, 35, 43, 47, 61, 77, 90, 97, 100, 106, 117, 153, 210, 246, 296, 308,
{"source": 6424, "title": "from dpo"}
The Sabatier reaction or Sabatier process produces methane and water from a reaction of hydrogen with carbon dioxide at elevated temperatures (optimally 300–400 °C) and pressures (perhaps 3 megapascals (440 psi; 30 bar)) in the presence of a nickel catalyst. It was discovered by the French chemists Paul Sabatier and Jean-Baptiste Senderens in 1897. Optionally, ruthenium on alumina (aluminium oxide) makes a more efficient catalyst. It is described by the following exothermic reaction: CO 2 + 4 H 2 → pressure + catalyst 400 ∘ C CH 4 + 2 H 2 O {\displaystyle {\ce {CO2{}+4H2->[{} \atop 400\ ^{\circ }{\ce {C}}][{\ce {pressure+catalyst}}]CH4{}+2H2O}}} ∆H = −165.0 kJ/mol There is disagreement on whether the CO2 methanation occurs by first associatively adsorbing an adatom hydrogen and forming oxygen intermediates before hydrogenation or dissociating and forming a carbonyl before being hydrogenated. CO + 3 H 2 ⟶ CH 4 + H 2 O {\displaystyle {\ce {{CO}+ 3H2 -> {CH4}+ H2O}}} ∆H = −206 kJ/mol CO methanation is believed to occur through a dissociative mechanism where the carbon oxygen bond is broken before hydrogenation with an associative mechanism only being observed at high H2 concentrations. Methanation reactions over different metal catalysts including Ni, Ru and Rh have been widely investigated for the production of CH4 from syngas and other power to gas initiatives. Nickel is the most widely used catalyst owing to its high selectivity and low cost. == Applications == === Creation of synthetic natural gas === Methanation is an important step in the creation of synthetic or substitute natural gas (SNG). Coal or wood undergo gasification which creates a producer gas that must undergo methaneation in order to produce a usable gas that just needs to undergo a final purification step. The first commercial synthetic gas plant opened in 1984 and is the
{"page_id": 1393634, "title": "Sabatier reaction"}